Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
anti-virus vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2008-5541
Sophos Anti-Virus 4.33.0, when Internet Explorer 6 or 7 is used, allows remote malicious users to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt e...
Sophos Anti-virus 4.33.0
2.1
CVSSv2
CVE-2019-18645
The quarantine restoration function in Total Defense Anti-virus 11.5.2.28 is vulnerable to symbolic link attacks, allowing files to be written to privileged directories.
Totaldefense Anti-virus 11.5.2.28
NA
CVE-2023-1446
A vulnerability classified as problematic was found in Watchdog Anti-Virus 1.4.214.0. Affected by this vulnerability is the function 0x80002004/0x80002008 in the library wsdk-driver.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack...
Watchdog Anti-virus 1.4.214.0
NA
CVE-2023-1453
A vulnerability was found in Watchdog Anti-Virus 1.4.214.0. It has been rated as critical. Affected by this issue is the function 0x80002008 in the library wsdk-driver.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. Attacking locall...
Watchdog Anti-virus 1.4.214.0
NA
CVE-2024-23441
Vba32 Antivirus v3.36.0 is vulnerable to a Denial of Service vulnerability by triggering the 0x2220A7 IOCTL code of the Vba32m64.sys driver.
Anti-virus Vba32 3.36.0
6.8
CVSSv2
CVE-2007-6336
Off-by-one error in ClamAV prior to 0.92 allows remote malicious users to execute arbitrary code via a crafted MS-ZIP compressed CAB file.
Clam Anti-virus Clamav
NA
CVE-2022-38611
Incorrect access control in Watchdog Anti-Virus v1.4.158 allows malicious users to perform a DLL hijacking attack and execute arbitrary code via a crafted binary.
Watchdog Anti-virus 1.4.158
4.6
CVSSv2
CVE-2019-13355
In Total Defense Anti-virus 9.0.0.773, insecure access control for the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\ used by ccschedulersvc.exe allows local malicious users to hijack dotnetproxy.exe, which leads to privilege escalation when the ccSchedulerSVC service runs ...
Totaldefense Anti-virus 9.0.0.773
4.6
CVSSv2
CVE-2019-13356
In Total Defense Anti-virus 9.0.0.773, insecure access control for the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\bd\TDUpdate2\ used by AMRT.exe allows local malicious users to hijack bdcore.dll, which leads to privilege escalation when the AMRT service loads the DLL.
Totaldefense Anti-virus 9.0.0.773
4.6
CVSSv2
CVE-2019-13357
In Total Defense Anti-virus 9.0.0.773, resource acquisition from the untrusted search path C:\ used by caschelp.exe allows local malicious users to hijack ccGUIFrm.dll, which leads to code execution. SYSTEM-level code execution can be achieved when the ccSchedulerSVC service runs...
Totaldefense Anti-virus 9.0.0.773
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »