Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kaspersky lab kaspersky anti-virus 5.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-4926
The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structur...
Kaspersky Lab Kaspersky Anti-virus Personal Pro 5.0
Kaspersky Lab Kaspersky Anti-virus Personal 5.0
Kaspersky Lab Kaspersky Anti-virus 5.0
Kaspersky Lab Kaspersky Internet Security 6.0
Kaspersky Lab Kaspersky Anti-virus 6.0
1 EDB exploit
NA
CVE-2005-3142
Heap-based buffer overflow in Kaspersky Antivirus (KAV) 5.0 and Kaspersky Personal Security Suite 1.1 allows remote malicious users to execute arbitrary code via a CAB file with large records after the header.
Kaspersky Lab Kaspersky Anti-virus Personal Pro 5.0
Kaspersky Lab Kaspersky Anti-virus Personal 5.0
Kaspersky Lab Kaspersky Anti-virus 5.0
Kaspersky Lab Kaspersky Personal Security Suite 1.1
NA
CVE-2009-4452
Kaspersky Anti-Virus 5.0 (5.0.712); Antivirus Personal 5.0.x; Anti-Virus 6.0 (6.0.3.837), 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); and Internet Security 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); use weak permissions (Everyone:Full Control) for the BASES dir...
Kaspersky Lab Kaspersky Anti-virus Personal 5.0.228
Kaspersky Lab Kaspersky Anti-virus 2009 8.0.0.454
Kaspersky Lab Kaspersky Anti-virus 5.0.712
Kaspersky Lab Kaspersky Anti-virus 2010 9.0.0.463
Kaspersky Lab Kaspersky Anti-virus Personal 5.0.227
Kaspersky Lab Kaspersky Anti-virus 7.0.1.325
Kaspersky Lab Kaspersky Internet Security 2010 9.0.0.463
Kaspersky Lab Kaspersky Anti-virus Personal 5.0
Kaspersky Lab Kaspersky Internet Security 2009 8.0.0.506
Kaspersky Lab Kaspersky Internet Security 7.0.1.325
Kaspersky Lab Kaspersky Anti-virus 6.0.3.837
Kaspersky Lab Kaspersky Anti-virus Personal 5.0.325
1 EDB exploit
NA
CVE-2005-3663
Unquoted Windows search path vulnerability in Kaspersky Anti-Virus 5.0 might allow local users to gain privileges via a malicious "program.exe" file in the C: folder.
Kaspersky Lab Kaspersky Anti-virus 5.0
NA
CVE-2005-2582
Kaspersky Anti-Virus for Unix/Linux File Servers 5.0-5 uses world-writable permissions for the (1) log and (2) license directory, which allows local users to delete log files, append to arbitrary files via a symlink attack on kavmonitor.log, or delete license keys and prevent kee...
Kaspersky Lab Kaspersky Anti-virus 5.0.5
NA
CVE-2004-0932
McAfee Anti-Virus Engine DATS drivers prior to 4398 released on Oct 13th 2004 and DATS Driver prior to 4397 October 6th 2004 allows remote malicious users to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent t...
Eset Software Nod32 Antivirus 1.0.11
Kaspersky Lab Kaspersky Anti-virus 4.0
Sophos Sophos Small Business Suite 1.0
Sophos Sophos Anti-virus 3.83
Archive Zip Archive Zip 1.13
Mcafee Antivirus Engine 4.3.20
Kaspersky Lab Kaspersky Anti-virus 5.0
Ca Etrust Antivirus 7.0 Sp2
Sophos Sophos Anti-virus 3.80
Sophos Sophos Anti-virus 3.81
Eset Software Nod32 Antivirus 1.0.12
Sophos Sophos Anti-virus 3.86
Sophos Sophos Anti-virus 3.78
Rav Antivirus Rav Antivirus Desktop 8.6
Rav Antivirus Rav Antivirus For Mail Servers 8.4.2
Rav Antivirus Rav Antivirus For File Servers 1.0
Sophos Sophos Anti-virus 3.82
Sophos Sophos Anti-virus 3.79
Sophos Sophos Puremessage Anti-virus 4.6
Sophos Sophos Anti-virus 3.78d
Sophos Sophos Anti-virus 3.4.6
Ca Etrust Secure Content Manager 1.0
1 EDB exploit
1 Github repository
NA
CVE-2004-0933
Computer Associates (CA) InoculateIT 6.0, eTrust Antivirus r6.0 through r7.1, eTrust Antivirus for the Gateway r7.0 and r7.1, eTrust Secure Content Manager, eTrust Intrusion Detection, EZ-Armor 2.0 up to and including 2.4, and EZ-Antivirus 6.1 up to and including 6.3 allow remote...
Eset Software Nod32 Antivirus 1.0.11
Kaspersky Lab Kaspersky Anti-virus 4.0
Sophos Sophos Small Business Suite 1.0
Sophos Sophos Anti-virus 3.83
Archive Zip Archive Zip 1.13
Mcafee Antivirus Engine 4.3.20
Kaspersky Lab Kaspersky Anti-virus 5.0
Ca Etrust Antivirus 7.0 Sp2
Sophos Sophos Anti-virus 3.80
Sophos Sophos Anti-virus 3.81
Eset Software Nod32 Antivirus 1.0.12
Sophos Sophos Anti-virus 3.86
Sophos Sophos Anti-virus 3.78
Rav Antivirus Rav Antivirus Desktop 8.6
Rav Antivirus Rav Antivirus For Mail Servers 8.4.2
Rav Antivirus Rav Antivirus For File Servers 1.0
Sophos Sophos Anti-virus 3.82
Sophos Sophos Anti-virus 3.79
Sophos Sophos Puremessage Anti-virus 4.6
Sophos Sophos Anti-virus 3.78d
Sophos Sophos Anti-virus 3.4.6
Ca Etrust Secure Content Manager 1.0
1 EDB exploit
NA
CVE-2004-0934
Kaspersky 3.x to 4.x allows remote malicious users to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
Eset Software Nod32 Antivirus 1.0.11
Kaspersky Lab Kaspersky Anti-virus 4.0
Sophos Sophos Small Business Suite 1.0
Sophos Sophos Anti-virus 3.83
Archive Zip Archive Zip 1.13
Mcafee Antivirus Engine 4.3.20
Kaspersky Lab Kaspersky Anti-virus 5.0
Ca Etrust Antivirus 7.0 Sp2
Sophos Sophos Anti-virus 3.80
Sophos Sophos Anti-virus 3.81
Eset Software Nod32 Antivirus 1.0.12
Sophos Sophos Anti-virus 3.86
Sophos Sophos Anti-virus 3.78
Rav Antivirus Rav Antivirus Desktop 8.6
Rav Antivirus Rav Antivirus For Mail Servers 8.4.2
Rav Antivirus Rav Antivirus For File Servers 1.0
Sophos Sophos Anti-virus 3.82
Sophos Sophos Anti-virus 3.79
Sophos Sophos Puremessage Anti-virus 4.6
Sophos Sophos Anti-virus 3.78d
Sophos Sophos Anti-virus 3.4.6
Ca Etrust Secure Content Manager 1.0
1 EDB exploit
NA
CVE-2004-0935
Eset Anti-Virus prior to 1.020 (16th September 2004) allows remote malicious users to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
Eset Software Nod32 Antivirus 1.0.11
Kaspersky Lab Kaspersky Anti-virus 4.0
Sophos Sophos Small Business Suite 1.0
Sophos Sophos Anti-virus 3.83
Archive Zip Archive Zip 1.13
Mcafee Antivirus Engine 4.3.20
Kaspersky Lab Kaspersky Anti-virus 5.0
Ca Etrust Antivirus 7.0 Sp2
Sophos Sophos Anti-virus 3.80
Sophos Sophos Anti-virus 3.81
Eset Software Nod32 Antivirus 1.0.12
Sophos Sophos Anti-virus 3.86
Sophos Sophos Anti-virus 3.78
Rav Antivirus Rav Antivirus Desktop 8.6
Rav Antivirus Rav Antivirus For Mail Servers 8.4.2
Rav Antivirus Rav Antivirus For File Servers 1.0
Sophos Sophos Anti-virus 3.82
Sophos Sophos Anti-virus 3.79
Sophos Sophos Puremessage Anti-virus 4.6
Sophos Sophos Anti-virus 3.78d
Sophos Sophos Anti-virus 3.4.6
Ca Etrust Secure Content Manager 1.0
1 EDB exploit
NA
CVE-2004-0936
RAV antivirus allows remote malicious users to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
Eset Software Nod32 Antivirus 1.0.11
Kaspersky Lab Kaspersky Anti-virus 4.0
Sophos Sophos Small Business Suite 1.0
Sophos Sophos Anti-virus 3.83
Archive Zip Archive Zip 1.13
Mcafee Antivirus Engine 4.3.20
Kaspersky Lab Kaspersky Anti-virus 5.0
Ca Etrust Antivirus 7.0 Sp2
Sophos Sophos Anti-virus 3.80
Sophos Sophos Anti-virus 3.81
Eset Software Nod32 Antivirus 1.0.12
Sophos Sophos Anti-virus 3.86
Sophos Sophos Anti-virus 3.78
Rav Antivirus Rav Antivirus Desktop 8.6
Rav Antivirus Rav Antivirus For Mail Servers 8.4.2
Rav Antivirus Rav Antivirus For File Servers 1.0
Sophos Sophos Anti-virus 3.82
Sophos Sophos Anti-virus 3.79
Sophos Sophos Puremessage Anti-virus 4.6
Sophos Sophos Anti-virus 3.78d
Sophos Sophos Anti-virus 3.4.6
Ca Etrust Secure Content Manager 1.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29824
CVE-2024-30095
CVE-2024-30104
client side
CVE-2024-5840
CVE-2024-34405
unprivileged
wireless
CVE-2024-4577
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »