Show filters
61 Total Results
Displaying 21-30 of 61
Sort by:
Attacker Value
Unknown

CVE-2019-16519

Disclosure Date: October 14, 2019 (last updated November 27, 2024)
ESET Cyber Security 6.7.900.0 for macOS allows a local attacker to execute unauthorized commands as root by abusing an undocumented feature in scheduled tasks.
Attacker Value
Unknown

CVE-2019-14242

Disclosure Date: July 30, 2019 (last updated November 27, 2024)
An issue was discovered in Bitdefender products for Windows (Bitdefender Endpoint Security Tool versions prior to 6.6.8.115; and Bitdefender Antivirus Plus, Bitdefender Internet Security, and Bitdefender Total Security versions prior to 23.0.24.120) that can lead to local code injection. A local attacker with administrator privileges can create a malicious DLL file in %SystemRoot%\System32\ that will be executed with local user privileges.
0
Attacker Value
Unknown

CVE-2018-12238

Disclosure Date: November 29, 2018 (last updated November 27, 2024)
Norton prior to 22.15; Symantec Endpoint Protection (SEP) prior to 12.1.7454.7000 & 14.2; Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to NIS-22.15.1.8 & SEP-12.1.7454.7000; and Symantec Endpoint Protection Cloud (SEP Cloud) prior to 22.15.1 may be susceptible to an AV bypass issue, which is a type of exploit that works to circumvent one of the virus detection engines to avoid a specific type of virus protection. One of the antivirus engines depends on a signature pattern from a database to identify malicious files and viruses; the antivirus bypass exploit looks to alter the file being scanned so it is not detected.
0
Attacker Value
Unknown

CVE-2018-12239

Disclosure Date: November 29, 2018 (last updated November 27, 2024)
Norton prior to 22.15; Symantec Endpoint Protection (SEP) prior to 12.1.7454.7000 & 14.2; Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to NIS-22.15.1.8 & SEP-12.1.7454.7000; and Symantec Endpoint Protection Cloud (SEP Cloud) prior to 22.15.1 may be susceptible to an AV bypass issue, which is a type of exploit that works to circumvent one of the virus detection engines to avoid a specific type of virus protection. One of the antivirus engines depends on a signature pattern from a database to identify malicious files and viruses; the antivirus bypass exploit looks to alter the file being scanned so it is not detected.
0
Attacker Value
Unknown

CVE-2017-16556

Disclosure Date: January 16, 2018 (last updated November 26, 2024)
In K7 Antivirus Premium before 15.1.0.53, user-controlled input can be used to allow local users to write to arbitrary memory locations.
0
Attacker Value
Unknown

CVE-2017-16549

Disclosure Date: January 16, 2018 (last updated November 26, 2024)
K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls.
0
Attacker Value
Unknown

CVE-2017-16557

Disclosure Date: January 16, 2018 (last updated November 26, 2024)
K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way.
0
Attacker Value
Unknown

CVE-2017-16552

Disclosure Date: January 16, 2018 (last updated November 26, 2024)
K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls.
0
Attacker Value
Unknown

CVE-2017-17429

Disclosure Date: January 16, 2018 (last updated November 26, 2024)
In K7 Antivirus Premium before 15.1.0.53, user-controlled input to the K7Sentry device is not sufficiently authenticated: a local user with a LOW integrity process can access a raw hard disk by sending a specific IOCTL.
0
Attacker Value
Unknown

CVE-2017-16554

Disclosure Date: January 16, 2018 (last updated November 26, 2024)
K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls.
0