Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kaspersky lab kaspersky anti-virus vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-1879
The StartUploading function in KL.SysInfo ActiveX control (AxKLSysInfo.dll) in Kaspersky Anti-Virus 6.0 and Internet Security 6.0 before Maintenance Pack 2 build 6.0.2.614 allows remote malicious users to read arbitrary files by triggering an outbound anonymous FTP session that i...
Kaspersky Lab Kaspersky Internet Security
Kaspersky Lab Kaspersky Anti-virus 6.0
NA
CVE-2007-1880
Integer overflow in the _NtSetValueKey function in klif.sys in Kaspersky Anti-Virus, Anti-Virus for Workstations, Anti-Virus for File Server 6.0, and Internet Security 6.0 before Maintenance Pack 2 build 6.0.2.614 allows context-dependent malicious users to execute arbitrary code...
Kaspersky Lab Kaspersky Internet Security
Kaspersky Lab Kaspersky Anti-virus 6.0
Kaspersky Lab Kaspersky Anti-virus
NA
CVE-2007-1112
Kaspersky Anti-Virus 6.0 and Internet Security 6.0 exposes unsafe methods in the (a) AXKLPROD60Lib.KAV60Info (AxKLProd60.dll) and (b) AXKLSYSINFOLib.SysInfo (AxKLSysInfo.dll) ActiveX controls, which allows remote malicious users to "download" or delete arbitrary files v...
Kaspersky Lab Kaspersky Anti-virus 6.0
Kaspersky Lab Kaspersky Internet Security 6.0
NA
CVE-2007-1881
Unspecified vulnerability in KLIF (klif.sys) in Kaspersky Anti-Virus, Anti-Virus for Workstations, and Anti-Virus for File Servers 6.0, and Internet Security 6.0 before Maintenance Pack 2 build 6.0.2.614 allows local users to gain Ring-0 privileges via unspecified vectors.
Kaspersky Lab Kaspersky Anti-virus
Kaspersky Lab Kaspersky Internet Security
Kaspersky Lab Kaspersky Anti-virus 6.0
1 EDB exploit
NA
CVE-2006-6408
Kaspersky Anti-Virus for Linux Mail Servers 5.5.10 allows remote malicious users to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file.
Kaspersky Lab Kaspersky Anti-virus 5.5.10
NA
CVE-2006-4926
The NDIS-TDI Hooking Engine, as used in the (1) KLICK (KLICK.SYS) and (2) KLIN (KLIN.SYS) device drivers 2.0.0.281 for in Kaspersky Labs Anti-Virus 6.0.0.303 and other Anti-Virus and Internet Security products, allows local users to execute arbitrary code via crafted Irp structur...
Kaspersky Lab Kaspersky Internet Security 6.0
Kaspersky Lab Kaspersky Anti-virus 6.0
Kaspersky Lab Kaspersky Anti-virus Personal 5.0
Kaspersky Lab Kaspersky Anti-virus Personal Pro 5.0
Kaspersky Lab Kaspersky Anti-virus 5.0
1 EDB exploit
NA
CVE-2006-1091
Kaspersky Antivirus 5.0.5 and 5.5.3 allows remote malicious users to cause a denial of service (CPU and memory consumption) via unknown attack vectors.
Kaspersky Lab Kaspersky Anti-virus 5.0.5
Kaspersky Lab Kaspersky Anti-virus 5.5.3
NA
CVE-2005-3663
Unquoted Windows search path vulnerability in Kaspersky Anti-Virus 5.0 might allow local users to gain privileges via a malicious "program.exe" file in the C: folder.
Kaspersky Lab Kaspersky Anti-virus 5.0
NA
CVE-2005-3664
Heap-based buffer overflow in Kaspersky Anti-Virus Engine, as used in Kaspersky Personal 5.0.227, Anti-Virus On-Demand Scanner for Linux 5.0.5, and F-Secure Anti-Virus for Linux 4.50 allows remote malicious users to execute arbitrary code via a crafted CHM file.
F-secure F-secure Anti-virus 4.50
Kaspersky Lab Kaspersky Anti-virus 5.0.5
Kaspersky Lab Kaspersky Anti-virus Personal 5.0.227
NA
CVE-2005-3376
Multiple interpretation error in Kaspersky 5.0.372 allows remote malicious users to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type tha...
Kaspersky Lab Kaspersky Anti-virus 5.0.372
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »