Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
anti-spyware vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-3560
Zone Labs (1) ZoneAlarm Pro 6.0, (2) ZoneAlarm Internet Security Suite 6.0, (3) ZoneAlarm Anti-Virus 6.0, (4) ZoneAlarm Anti-Spyware 6.0 up to and including 6.1, and (5) ZoneAlarm 6.0 allow remote malicious users to bypass the "Advanced Program Control and OS Firewall filter...
Zonelabs Zonealarm 6.0
Zonelabs Zonealarm Anti-spyware 6.1
Zonelabs Zonealarm Antivirus 6.0
Zonelabs Zonealarm Anti-spyware 6.0
Zonelabs Zonealarm Security Suite 6.0
1 EDB exploit
NA
CVE-2006-0858
Unquoted Windows search path vulnerability in (1) snsmcon.exe, (2) the autostartup mechanism, and (3) an unspecified installation component in StarForce Safe'n'Sec Personal + Anti-Spyware 2.0 and previous versions, and possibly other StarForce Safe'n'Sec produ...
Starforce Safe N Sec Personal \\+ Anti-spyware
NA
CVE-2009-0042
Multiple unspecified vulnerabilities in the Arclib library (arclib.dll) prior to 7.3.0.15 in the CA Anti-Virus engine for CA Anti-Virus for the Enterprise 7.1, r8, and r8.1; Anti-Virus 2007 v8 and 2008; Internet Security Suite 2007 v3 and 2008; and other CA products allow remote ...
Broadcom Anti-virus 2008
Ca Internet Security Suite Plus 2008
Ca Internet Security Suite 2008
Broadcom Anti-spyware 2008
Broadcom Anti-spyware For The Enterprise 8.1
Ca Etrust Intrusion Detection 2.0
Broadcom Etrust Intrusion Detection 3.0
Broadcom Etrust Ez Antivirus R7
Ca Threat Manager For The Enterprise R8
Broadcom Network And Systems Management R3.0
Broadcom Network And Systems Management R3.1
Ca Internet Security Suite 2007 3
Ca Threat Manager For The Enterprise 8.1
Ca Arcserve Backup R11.1
Ca Arcserve Backup R11.5 Nil
Ca Etrust Intrusion Detection 3.0
Broadcom Etrust Intrusion Detection 4.0
Ca Protection Suites R2
Ca Protection Suites R3.1
Broadcom Anti-virus For The Enterprise 7.1
Broadcom Antivirus Gateway 7.1
Broadcom Secure Content Manager 8.0
NA
CVE-2023-36167
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
1 EDB exploit
7.8
CVSSv3
CVE-2023-52091
An anti-spyware engine link following vulnerability in Trend Micro Apex One could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to ...
Trendmicro Apex One 2019
Trendmicro Apex One
NA
CVE-2007-3875
arclib.dll prior to 7.3.0.9 in CA Anti-Virus (formerly eTrust Antivirus) 8 and certain other CA products allows remote malicious users to cause a denial of service (infinite loop and loss of antivirus functionality) via an invalid "previous listing chunk number" field i...
Broadcom Anti-virus For The Enterprise 8
Broadcom Anti-virus For The Enterprise 8.1
Ca Brightstor Arcserve Backup 11
Broadcom Brightstor Arcserve Backup 9.01
Broadcom Etrust Ez Antivirus 6.1
Broadcom Etrust Ez Antivirus 7
Broadcom Etrust Intrusion Detection 3.0
Ca Etrust Intrusion Detection 3.0
Broadcom Unicenter Network And Systems Management 11
Broadcom Unicenter Network And Systems Management 11.1
Broadcom Anti-virus For The Enterprise 7.0
Broadcom Anti-virus For The Enterprise 7.1
Broadcom Brightstor Arcserve Backup 11.1
Broadcom Brightstor Arcserve Backup 11.5
Broadcom Common Services 11.1
Broadcom Etrust Antivirus 8
Broadcom Etrust Antivirus Gateway 7.1
Broadcom Etrust Internet Security Suite 2
Broadcom Etrust Intrusion Detection 2.0
Broadcom Secure Content Manager 8.0
Broadcom Threat Manager 8
Broadcom Anti Virus Sdk
NA
CVE-2007-0856
TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterpr...
Trend Micro Trend Micro Antirootkit Common Module
Trend Micro Trend Micro Antispyware 3.0 Sp2
Trend Micro Client-server-messaging Security 3.5
Trend Micro Damage Cleanup Services 3.2
Trend Micro Trend Micro Antivirus 2007
Trend Micro Vsapini.sys 3.320.1003
Trend Micro Pc-cillin Internet Security 2007
Trend Micro Tmcomm.sys 1.5.1052
Trend Micro Trend Micro Antispyware 3.2 Sp1
Trend Micro Trend Micro Antispyware 3.5
NA
CVE-2006-2334
The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent malicious users to create files that cannot be accessed through t...
Microsoft Windows Xp
Microsoft Windows 2000
1 EDB exploit
NA
CVE-2007-2522
Stack-based buffer overflow in the inoweb Console Server in CA Anti-Virus for the Enterprise r8, Threat Manager r8, Anti-Spyware for the Enterprise r8, and Protection Suites r3 allows remote malicious users to execute arbitrary code via a long (1) username or (2) password.
Broadcom Antispyware For The Enterprise 8.0
Broadcom Etrust Integrated Threat Management 8.0
Broadcom Etrust Pestpatrol 8.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-24955
man-in-the-middle
dos
CVE-2024-2818
CVE-2024-30584
CVE-2024-31134
camera
CVE-2023-45866
CVE-2024-30585
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started