Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kaspersky vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-2582
Kaspersky Anti-Virus for Unix/Linux File Servers 5.0-5 uses world-writable permissions for the (1) log and (2) license directory, which allows local users to delete log files, append to arbitrary files via a symlink attack on kavmonitor.log, or delete license keys and prevent kee...
Kaspersky Lab Kaspersky Anti-virus 5.0.5
NA
CVE-2005-3663
Unquoted Windows search path vulnerability in Kaspersky Anti-Virus 5.0 might allow local users to gain privileges via a malicious "program.exe" file in the C: folder.
Kaspersky Lab Kaspersky Anti-virus 5.0
NA
CVE-2010-5163
Race condition in Kaspersky Internet Security 2010 9.0.0.736 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space ...
Kaspersky Kaspersky Internet Security 2010 9.0.0.736
NA
CVE-2006-6408
Kaspersky Anti-Virus for Linux Mail Servers 5.5.10 allows remote malicious users to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file.
Kaspersky Lab Kaspersky Anti-virus 5.5.10
NA
CVE-2003-1443
Kaspersky Antivirus (KAV) 4.0.9.0 does not detect viruses in files with MS-DOS device names in their filenames, which allows local users to bypass virus protection, as demonstrated using aux.vbs and aux.com.
Kaspersky Lab Kaspersky Anti-virus 4.0.9.0
NA
CVE-2005-3376
Multiple interpretation error in Kaspersky 5.0.372 allows remote malicious users to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type tha...
Kaspersky Lab Kaspersky Anti-virus 5.0.372
7.8
CVSSv3
CVE-2021-35052
A component in Kaspersky Password Manager could allow an malicious user to elevate a process Integrity level from Medium to High.
Kaspersky Password Manager 9.0.2
Kaspersky Password Manager
1 Article
NA
CVE-2008-5426
Kaspersky Internet Security Suite 2009 does not properly handle (1) multipart/mixed e-mail messages with many MIME parts and possibly (2) e-mail messages with many "Content-type: message/rfc822;" headers, which allows remote malicious users to cause a denial of service ...
Kaspersky Lab Kaspersky Internet Security Suite 2009
7.5
CVSSv3
CVE-2020-27020
Password generator feature in Kaspersky Password Manager was not completely cryptographically strong and potentially allowed an malicious user to predict generated passwords in some cases. An attacker would need to know some additional information (for example, time of password g...
Kaspersky Password Manager
Kaspersky Password Manager 9.2
1 Article
7.8
CVSSv3
CVE-2020-25045
Installers of Kaspersky Security Center and Kaspersky Security Center Web Console before 12 & before 12 Patch A were vulnerable to a DLL hijacking attack that allowed an malicious user to elevate privileges in the system.
Kaspersky Security Center Web Console
Kaspersky Security Center
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »