Show filters
43 Total Results
Displaying 11-20 of 43
Sort by:
Attacker Value
Unknown

CVE-2021-25101

Disclosure Date: February 21, 2022 (last updated October 07, 2023)
The Anti-Malware Security and Brute-Force Firewall WordPress plugin before 4.20.94 does not sanitise and escape the POST data before outputting it back in attributes of an admin page, leading to a Reflected Cross-Site scripting. Due to the presence of specific parameter value, available to admin users, this can only be exploited by an admin against another admin user.
Attacker Value
Unknown

CVE-2020-9320

Disclosure Date: February 20, 2020 (last updated February 21, 2025)
Avira AV Engine before 8.3.54.138 allows virus-detection bypass via a crafted ISO archive. This affects versions before 8.3.54.138 of Antivirus for Endpoint, Antivirus for Small Business, Exchange Security (Gateway), Internet Security Suite for Windows, Prime, Free Security Suite for Windows, and Cross Platform Anti-malware SDK. NOTE: Vendor asserts that vulnerability does not exist in product
Attacker Value
Unknown

CVE-2019-7651

Disclosure Date: February 08, 2019 (last updated November 27, 2024)
EPP.sys in Emsisoft Anti-Malware prior to version 2018.12 allows an attacker to bypass ACLs because Interpreted Device Characteristics lacks FILE_DEVICE_SECURE_OPEN and therefore files and directories "inside" the \\.\EPP device are not properly protected, leading to unintended impersonation or object creation. This vulnerability has been fixed in version 2018.12 and later.
0
Attacker Value
Unknown

CVE-2016-10717

Disclosure Date: March 21, 2018 (last updated November 26, 2024)
A vulnerability in the encryption and permission implementation of Malwarebytes Anti-Malware consumer version 2.2.1 and prior (fixed in 3.0.4) allows an attacker to take control of the whitelisting feature (exclusions.dat under %SYSTEMDRIVE%\ProgramData) to permit execution of unauthorized applications including malware and malicious websites. Files blacklisted by Malwarebytes Malware Protect can be executed, and domains blacklisted by Malwarebytes Web Protect can be reached through HTTP.
0
Attacker Value
Unknown

CVE-2018-6625

Disclosure Date: February 05, 2018 (last updated November 26, 2024)
In WatchDog Anti-Malware 2.74.186.150, the driver file (ZAMGUARD32.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x80002010.
0
Attacker Value
Unknown

CVE-2018-6627

Disclosure Date: February 05, 2018 (last updated November 26, 2024)
In WatchDog Anti-Malware 2.74.186.150, the driver file (ZAMGUARD32.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x80002054.
0
Attacker Value
Unknown

CVE-2018-5714

Disclosure Date: January 16, 2018 (last updated November 26, 2024)
In Malwarefox Anti-Malware 2.72.169, the driver file (zam64.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x80002054.
0
Attacker Value
Unknown

CVE-2018-5713

Disclosure Date: January 16, 2018 (last updated November 26, 2024)
In Malwarefox Anti-Malware 2.72.169, the driver file (zam64.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x80002010.
0
Attacker Value
Unknown

CVE-2017-15920

Disclosure Date: October 30, 2017 (last updated November 26, 2024)
In Watchdog Anti-Malware 2.74.186.150 and Online Security Pro 2.74.186.150, the zam32.sys driver contains a NULL pointer dereference vulnerability that gets triggered when sending an operation to ioctl 0x80002054. This is due to the input buffer being NULL or the input buffer size being 0 as they are not validated.
0
Attacker Value
Unknown

CVE-2017-15921

Disclosure Date: October 30, 2017 (last updated November 26, 2024)
In Watchdog Anti-Malware 2.74.186.150 and Online Security Pro 2.74.186.150, the zam32.sys driver contains a NULL pointer dereference vulnerability that gets triggered when sending an operation to ioctl 0x80002010. This is due to the input buffer being NULL or the input buffer size being 0 as they are not validated.
0