Show filters
595 Total Results
Displaying 471-480 of 595
Sort by:
Attacker Value
Unknown

CVE-2007-1591

Disclosure Date: March 22, 2007 (last updated October 04, 2023)
VsapiNT.sys in the Scan Engine 8.0 for Trend Micro AntiVirus 14.10.1041, and other products, allows remote attackers to cause a denial of service (kernel fault and system crash) via a crafted UPX file with a certain field that triggers a divide-by-zero error.
0
Attacker Value
Unknown

CVE-2007-1476

Disclosure Date: March 16, 2007 (last updated October 04, 2023)
The SymTDI device driver (SYMTDI.SYS) in Symantec Norton Personal Firewall 2006 9.1.1.7 and earlier, Internet Security 2005 and 2006, AntiVirus Corporate Edition 3.0.x through 10.1.x, and other Norton products, allows local users to cause a denial of service (system crash) by sending crafted data to the driver's \Device file, which triggers invalid memory access, a different vulnerability than CVE-2006-4855.
0
Attacker Value
Unknown

CVE-2007-1281

Disclosure Date: March 06, 2007 (last updated October 04, 2023)
Kaspersky AntiVirus Engine 6.0.1.411 for Windows and 5.5-10 for Linux allows remote attackers to cause a denial of service (CPU consumption) via a crafted UPX compressed file with a negative offset, which triggers an infinite loop during decompression.
0
Attacker Value
Unknown

CVE-2006-6490

Disclosure Date: February 22, 2007 (last updated October 04, 2023)
Multiple buffer overflows in the SupportSoft (1) SmartIssue (tgctlsi.dll) and (2) ScriptRunner (tgctlsr.dll) ActiveX controls, as used by Symantec Automated Support Assistant and Norton AntiVirus, Internet Security, and System Works 2006, allows remote attackers to execute arbitrary code via a crafted HTML message.
0
Attacker Value
Unknown

CVE-2007-0856

Disclosure Date: February 08, 2007 (last updated October 04, 2023)
TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the \\.\TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.
0
Attacker Value
Unknown

CVE-2007-0829

Disclosure Date: February 07, 2007 (last updated October 04, 2023)
avast! Server Edition before 4.7.726 does not demand a password in a certain intended context, even when a password has been set, which allows local users to bypass authentication requirements.
0
Attacker Value
Unknown

CVE-2007-0125

Disclosure Date: January 09, 2007 (last updated October 04, 2023)
Kaspersky Labs Antivirus Engine 6.0 for Windows and 5.5-10 for Linux before 20070102 enter an infinite loop upon encountering an invalid NumberOfRvaAndSizes value in the Optional Windows Header of a portable executable (PE) file, which allows remote attackers to cause a denial of service (CPU consumption) by scanning a crafted PE file.
0
Attacker Value
Unknown

CVE-2006-6676

Disclosure Date: December 21, 2006 (last updated October 04, 2023)
Integer overflow in the (a) OLE2 and (b) CHM parsers for ESET NOD32 Antivirus before 1.1743 allows remote attackers to execute arbitrary code via a crafted (1) .DOC or (2) .CAB file that triggers a heap-based buffer overflow.
0
Attacker Value
Unknown

CVE-2006-6677

Disclosure Date: December 21, 2006 (last updated October 04, 2023)
ESET NOD32 Antivirus before 1.1743 allows remote attackers to cause a denial of service (crash) via a crafted .CHM file that triggers a divide-by-zero error.
0
Attacker Value
Unknown

CVE-2006-6622

Disclosure Date: December 18, 2006 (last updated October 04, 2023)
Soft4Ever Look 'n' Stop (LnS) 2.05p2 before 20061215 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB.
0