Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
totaldefense vulnerabilities and exploits
(subscribe to this query)
5.8
CVSSv2
CVE-2019-18644
The malware scan function in Total Defense Anti-virus 11.5.2.28 is vulnerable to a TOCTOU bug; consequently, symbolic link attacks allow privileged files to be deleted.
Totaldefense Anti-virus 11.5.2.28
2.1
CVSSv2
CVE-2019-18645
The quarantine restoration function in Total Defense Anti-virus 11.5.2.28 is vulnerable to symbolic link attacks, allowing files to be written to privileged directories.
Totaldefense Anti-virus 11.5.2.28
4.6
CVSSv2
CVE-2019-13357
In Total Defense Anti-virus 9.0.0.773, resource acquisition from the untrusted search path C:\ used by caschelp.exe allows local malicious users to hijack ccGUIFrm.dll, which leads to code execution. SYSTEM-level code execution can be achieved when the ccSchedulerSVC service runs...
Totaldefense Anti-virus 9.0.0.773
4.6
CVSSv2
CVE-2019-13355
In Total Defense Anti-virus 9.0.0.773, insecure access control for the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\ used by ccschedulersvc.exe allows local malicious users to hijack dotnetproxy.exe, which leads to privilege escalation when the ccSchedulerSVC service runs ...
Totaldefense Anti-virus 9.0.0.773
4.6
CVSSv2
CVE-2019-13356
In Total Defense Anti-virus 9.0.0.773, insecure access control for the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\bd\TDUpdate2\ used by AMRT.exe allows local malicious users to hijack bdcore.dll, which leads to privilege escalation when the AMRT service loads the DLL.
Totaldefense Anti-virus 9.0.0.773
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
spoof
CVE-2024-34928
CVE-2024-5291
deserialization
CVE-2024-4471
CVE-2024-4956
CVE-2024-32002
CVE-2024-5227
unspecified
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started