Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
comodo vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-7872
Comodo GeekBuddy prior to 4.18.121 does not restrict access to the VNC server, which allows local users to gain privileges by connecting to the server.
Comodo Geekbuddy
1 EDB exploit
NA
CVE-2010-5157
Race condition in Comodo Internet Security prior to 4.1.149672.916 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-...
Comodo Comodo Internet Security
5.5
CVSSv3
CVE-2019-3970
Comodo Antivirus versions up to 12.0.0.6810 are vulnerable to Arbitrary File Write due to Cavwp.exe handling of Comodo's Antivirus database. Cavwp.exe loads Comodo antivirus definition database in unsecured global section objects, allowing a local low privileged process to m...
Comodo Antivirus
NA
CVE-2014-9633
The bdisk.sys driver in COMODO Backup prior to 4.4.1.23 allows remote malicious users to gain privileges via a crafted device handle, which triggers a NULL pointer dereference.
Comodo Backup
1 EDB exploit
7.8
CVSSv3
CVE-2022-34008
Comodo Antivirus 12.2.2.8012 has a quarantine flaw that allows privilege escalation. To escalate privilege, a low-privileged attacker can use an NTFS directory junction to restore a malicious DLL from quarantine into the System32 folder.
Comodo Antivirus 12.2.2.8012
4.7
CVSSv3
CVE-2019-14694
A use-after-free flaw in the sandbox container implemented in cmdguard.sys in Comodo Antivirus 12.0.0.6870 can be triggered due to a race condition when handling IRP_MJ_CLEANUP requests in the minifilter for directory change notifications. This allows an malicious user to cause a...
Comodo Antivirus 12.0.0.6870
9.8
CVSSv3
CVE-2018-17431
Web Console in Comodo UTM Firewall prior to 2.7.0 allows remote malicious users to execute arbitrary code without authentication via a crafted URL.
Comodo Unified Threat Management Firewall
1 Github repository
NA
CVE-2006-6621
Filseclab Personal Firewall 3.0.0.8686 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Symantec Sygate Personal Firewall 5.6.2808
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Avg Antivirus Plus Firewall 7.5.431
NA
CVE-2006-6622
Soft4Ever Look 'n' Stop (LnS) 2.05p2 prior to 20061215 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitl...
Avg Antivirus Plus Firewall 7.5.431
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Symantec Sygate Personal Firewall 5.6.2808
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
NA
CVE-2006-6618
AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
Comodo Comodo Personal Firewall 2.3.6.81
Filseclab Personal Firewall 3.0.8686
Avg Antivirus Plus Firewall 7.5.431
Infoprocess Antihook 3.0.23
Soft4ever Look N Stop 2.05p2
Symantec Sygate Personal Firewall 5.6.2808
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »