Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
avast vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2020-9399
The Avast AV parsing engine allows virus-detection bypass via a crafted ZIP archive. This affects versions prior to 12 definitions 200114-0 of Antivirus Pro, Antivirus Pro Plus, and Antivirus for Linux.
Avast Antivirus For Linux
Avast Antivirus Pro
Avast Antivirus Pro Plus
5.5
CVSSv3
CVE-2016-4025
Avast Internet Security v11.x.x, Pro Antivirus v11.x.x, Premier v11.x.x, Free Antivirus v11.x.x, Business Security v11.x.x, Endpoint Protection v8.x.x, Endpoint Protection Plus v8.x.x, Endpoint Protection Suite v8.x.x, Endpoint Protection Suite Plus v8.x.x, File Server Security v...
Avast Internet Security 11.1.2260
Avast Internet Security 11.1.2262
Avast Business Security 11.1.2262
Avast Free Antivirus 11.1.2253
Avast Premier 11.1.2261
Avast Pro Antivirus 11.1.2245
Avast Free Antivirus 11.1.2241
Avast Internet Security 11.1.2241
Avast Business Security 11.1.2245
Avast Business Security 11.1.2253
Avast Business Security 11.1.2260
Avast Business Security 11.1.2261
Avast Pro Antivirus 11.1.2260
Avast Pro Antivirus 11.1.2261
Avast Pro Antivirus 11.1.2262
Avast Pro Antivirus 11.1.2241
Avast Internet Security 11.1.2245
Avast Free Antivirus 11.1.2261
Avast Free Antivirus 11.1.2262
Avast Premier 11.1.2245
Avast Premier 11.1.2253
Avast Internet Security 11.1.2253
4.7
CVSSv3
CVE-2023-1586
Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the restore process leading to arbitrary file creation. The issue was fixed with Avast and AVG Antivirus version 22.11
Avast Antivirus
Avg Anti-virus
4.4
CVSSv3
CVE-2019-11230
In Avast Antivirus prior to 19.4, a local administrator can trick the product into renaming arbitrary files by replacing the Logs\Update.log file with a symlink. The next time the product attempts to write to the log file, the target of the symlink is renamed. This defect can be ...
Avast Antivirus
NA
CVE-2023-42124
This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists wit...
NA
CVE-2023-42125
This vulnerability allows local attackers to escalate privileges on affected installations of Avast Premium Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists wit...
NA
CVE-2015-5662
Directory traversal vulnerability in Avast prior to 150918-0 allows remote malicious users to delete or write to arbitrary files via a crafted entry in a ZIP archive.
Avast Avast Antivirus
NA
CVE-2010-5075
Integer overflow in aswFW.sys 5.0.594.0 in Avast! Internet Security 5.0 Korean Trial allows local users to cause a denial of service (memory corruption and panic) via a crafted IOCTL_ASWFW_COMM_PIDINFO_RESULTS DeviceIoControl request to \\.\aswFW.
Avast\\! Avast\\! Internet Security 5.0
1 EDB exploit
NA
CVE-2013-0122
The avast! Mobile Security application prior to 2.0.4400 for Android allows malicious users to cause a denial of service (application crash) via a crafted application that sends an intent to com.avast.android.mobilesecurity.app.scanner.DeleteFileActivity with zero arguments.
Avast Avast\\! Mobile Security
NA
CVE-2010-5151
Race condition in avast! Internet Security 5.0.462 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory cha...
Avast\\! Avast\\! Internet Security 5.0.462
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »