Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
comodo vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2014-9633
The bdisk.sys driver in COMODO Backup prior to 4.4.1.23 allows remote malicious users to gain privileges via a crafted device handle, which triggers a NULL pointer dereference.
Comodo Backup
1 EDB exploit
4.9
CVSSv2
CVE-2019-3973
Comodo Antivirus versions 11.0.0.6582 and below are vulnerable to Denial of Service affecting CmdGuard.sys via its filter port "cmdServicePort". A low privileged process can crash CmdVirth.exe to decrease the port's connection count followed by process hollowing a ...
Comodo Antivirus
7.2
CVSSv2
CVE-2014-7872
Comodo GeekBuddy prior to 4.18.121 does not restrict access to the VNC server, which allows local users to gain privileges by connecting to the server.
Comodo Geekbuddy
1 EDB exploit
6.2
CVSSv2
CVE-2010-5157
Race condition in Comodo Internet Security prior to 4.1.149672.916 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-...
Comodo Comodo Internet Security
7.2
CVSSv2
CVE-2022-34008
Comodo Antivirus 12.2.2.8012 has a quarantine flaw that allows privilege escalation. To escalate privilege, a low-privileged attacker can use an NTFS directory junction to restore a malicious DLL from quarantine into the System32 folder.
Comodo Antivirus 12.2.2.8012
4.7
CVSSv2
CVE-2019-14694
A use-after-free flaw in the sandbox container implemented in cmdguard.sys in Comodo Antivirus 12.0.0.6870 can be triggered due to a race condition when handling IRP_MJ_CLEANUP requests in the minifilter for directory change notifications. This allows an malicious user to cause a...
Comodo Antivirus 12.0.0.6870
7.5
CVSSv2
CVE-2018-17431
Web Console in Comodo UTM Firewall prior to 2.7.0 allows remote malicious users to execute arbitrary code without authentication via a crafted URL.
Comodo Unified Threat Management Firewall
1 Github repository
7.2
CVSSv2
CVE-2006-6619
AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Symantec Sygate Personal Firewall 5.6.2808
1 EDB exploit
7.2
CVSSv2
CVE-2006-6621
Filseclab Personal Firewall 3.0.0.8686 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Symantec Sygate Personal Firewall 5.6.2808
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
7.2
CVSSv2
CVE-2006-6623
Sygate Personal Firewall 5.6.2808 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Avg Antivirus Plus Firewall 7.5.431
Comodo Comodo Personal Firewall 2.3.6.81
Soft4ever Look N Stop 2.05p2
Symantec Sygate Personal Firewall 5.6.2808
Filseclab Personal Firewall 3.0.8686
Infoprocess Antihook 3.0.23
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »