Show filters
95 Total Results
Displaying 51-60 of 95
Sort by:
Attacker Value
Unknown
CVE-2020-8095
Disclosure Date: January 30, 2020 (last updated February 21, 2025)
A vulnerability in the improper handling of junctions before deletion in Bitdefender Total Security 2020 can allow an attacker to to trigger a denial of service on the affected device.
0
Attacker Value
Unknown
CVE-2020-8093
Disclosure Date: January 29, 2020 (last updated February 21, 2025)
A vulnerability in the AntivirusforMac binary as used in Bitdefender Antivirus for Mac allows an attacker to inject a library using DYLD environment variable to cause third-party code execution
0
Attacker Value
Unknown
CVE-2020-8092
Disclosure Date: January 29, 2020 (last updated February 21, 2025)
A privilege escalation vulnerability in BDLDaemon as used in Bitdefender Antivirus for Mac allows a local attacker to obtain authentication tokens for requests submitted to the Bitdefender Cloud. This issue affects: Bitdefender Bitdefender Antivirus for Mac versions prior to 8.0.0.
0
Attacker Value
Unknown
Bitdefender BOX 2 bootstrap download_image command injection vulnerability
Disclosure Date: January 27, 2020 (last updated February 21, 2025)
A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability.
0
Attacker Value
Unknown
Bitdefender BOX 2 bootstrap get_image_size command injection vulnerability
Disclosure Date: January 27, 2020 (last updated February 21, 2025)
A OS Command Injection vulnerability in the bootstrap stage of Bitdefender BOX 2 allows the manipulation of the `get_image_url()` function in special circumstances to inject a system command.
0
Attacker Value
Unknown
Bitdefender BOX v2 bootstrap update_setup command execution vulnerability (VA-2…
Disclosure Date: January 27, 2020 (last updated February 21, 2025)
An exploitable command execution vulnerability exists in the recovery partition of Bitdefender BOX 2, version 2.0.1.91. The API method `/api/update_setup` does not perform firmware signature checks atomically, leading to an exploitable race condition (TOCTTOU) that allows arbitrary execution of system commands. This issue affects: Bitdefender Bitdefender BOX 2 versions prior to 2.1.47.36.
0
Attacker Value
Unknown
Untrusted Search Path vulnerability in Bitdefender Total Security 2020 (VA-5895)
Disclosure Date: January 27, 2020 (last updated February 21, 2025)
An Untrusted Search Path vulnerability in bdserviceshost.exe as used in Bitdefender Total Security 2020 allows an attacker to execute arbitrary code. This issue does not affect: Bitdefender Total Security versions prior to 24.0.12.69.
0
Attacker Value
Unknown
CVE-2019-12612
Disclosure Date: October 31, 2019 (last updated November 27, 2024)
An issue was discovered in Bitdefender BOX firmware versions before 2.1.37.37-34 that allows an attacker to pass arbitrary code to the BOX appliance via the web API. In order to exploit this vulnerability, an attacker needs presence in Bitdefender BOX setup network and Bitdefender BOX be in setup mode.
0
Attacker Value
Unknown
CVE-2019-12611
Disclosure Date: October 17, 2019 (last updated November 27, 2024)
An issue was discovered in Bitdefender BOX firmware versions before 2.1.37.37-34 that affects the general reliability of the product. Specially crafted packets sent to the miniupnpd implementation in result in the device allocating memory without freeing it later. This behavior can cause the miniupnpd component to crash or to trigger a device reboot.
0
Attacker Value
Unknown
CVE-2019-15295
Disclosure Date: August 21, 2019 (last updated November 27, 2024)
An Untrusted Search Path vulnerability in the ServiceInstance.dll library versions 1.0.15.119 and lower, as used in Bitdefender Antivirus Free 2020 versions prior to 1.0.15.138, allows an attacker to load an arbitrary DLL file from the search path.
0