Filtered by vendor Kaspersky
Subscriptions
Total
61 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-15686 | 1 Kaspersky | 5 Anti-virus, Internet Security, Security Cloud and 2 more | 2024-11-21 | 4.3 Medium |
Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component allowed an attacker remotely disable various anti-virus protection features. DoS, Bypass. | ||||
CVE-2019-15685 | 1 Kaspersky | 5 Anti-virus, Internet Security, Security Cloud and 2 more | 2024-11-21 | 4.3 Medium |
Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component allowed an attacker remotely disable such product's security features as private browsing and anti-banner. Bypass. | ||||
CVE-2019-15684 | 2 Google, Kaspersky | 2 Chrome, Protection | 2024-11-21 | 4.3 Medium |
Kaspersky Protection extension for web browser Google Chrome prior to 30.112.62.0 was vulnerable to unauthorized access to its features remotely that could lead to removing other installed extensions. | ||||
CVE-2018-6306 | 1 Kaspersky | 1 Password Manager | 2024-11-21 | N/A |
Unauthorized code execution from specific DLL and is known as DLL Hijacking attack in Kaspersky Password Manager versions before 8.0.6.538. | ||||
CVE-2018-6291 | 1 Kaspersky | 1 Secure Mail Gateway | 2024-11-21 | N/A |
WebConsole Cross-Site Scripting in Kaspersky Secure Mail Gateway version 1.1. | ||||
CVE-2018-6290 | 1 Kaspersky | 1 Secure Mail Gateway | 2024-11-21 | N/A |
Local Privilege Escalation in Kaspersky Secure Mail Gateway version 1.1. | ||||
CVE-2018-6289 | 1 Kaspersky | 1 Secure Mail Gateway | 2024-11-21 | N/A |
Configuration file injection leading to Code Execution as Root in Kaspersky Secure Mail Gateway version 1.1. | ||||
CVE-2018-6288 | 1 Kaspersky | 1 Secure Mail Gateway | 2024-11-21 | N/A |
Cross-site Request Forgery leading to Administrative account takeover in Kaspersky Secure Mail Gateway version 1.1. | ||||
CVE-2017-9813 | 1 Kaspersky | 1 Anti-virus For Linux Server | 2024-11-21 | N/A |
In Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312), the scriptName parameter of the licenseKeyInfo action method is vulnerable to cross-site scripting (XSS). | ||||
CVE-2017-9812 | 1 Kaspersky | 1 Anti-virus For Linux Server | 2024-11-21 | N/A |
The reportId parameter of the getReportStatus action method can be abused in the web interface in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312) to read arbitrary files with kluser privileges. | ||||
CVE-2017-9811 | 1 Kaspersky | 1 Anti-virus For Linux Server | 2024-11-21 | N/A |
The kluser is able to interact with the kav4fs-control binary in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312). By abusing the quarantine read and write operations, it is possible to elevate the privileges to root. | ||||
CVE-2017-9810 | 1 Kaspersky | 1 Anti-virus For Linux Server | 2024-11-21 | N/A |
There are no Anti-CSRF tokens in any forms on the web interface in Kaspersky Anti-Virus for Linux File Server before Maintenance Pack 2 Critical Fix 4 (version 8.0.4.312). This would allow an attacker to submit authenticated requests when an authenticated user browses an attacker-controlled domain. | ||||
CVE-2017-12823 | 1 Kaspersky | 1 Embedded Systems Security | 2024-11-21 | N/A |
Kernel pool memory corruption in one of drivers in Kaspersky Embedded Systems Security version 1.2.0.300 leads to local privilege escalation. | ||||
CVE-2017-12817 | 1 Kaspersky | 1 Internet Security | 2024-11-21 | 7.5 High |
In Kaspersky Internet Security for Android 11.12.4.1622, some of the application trace files were not encrypted. | ||||
CVE-2017-12816 | 1 Kaspersky | 1 Internet Security | 2024-11-21 | 9.8 Critical |
In Kaspersky Internet Security for Android 11.12.4.1622, some of application exports activities have weak permissions, which might be used by a malware application to get unauthorized access to the product functionality by using Android IPC. | ||||
CVE-2016-6231 | 1 Kaspersky | 1 Safe Browser | 2024-11-21 | N/A |
Kaspersky Safe Browser iOS before 1.7.0 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to obtain sensitive information via a crafted certificate. | ||||
CVE-2016-4329 | 1 Kaspersky | 3 Anti-virus, Internet Security, Total Security | 2024-11-21 | N/A |
A local denial of service vulnerability exists in window broadcast message handling functionality of Kaspersky Anti-Virus software. Sending certain unhandled window messages, an attacker can cause application termination and in the same way bypass KAV self-protection mechanism. | ||||
CVE-2016-4307 | 1 Kaspersky | 1 Internet Security | 2024-11-21 | N/A |
A denial of service vulnerability exists in the IOCTL handling functionality of Kaspersky Internet Security KL1 driver. A specially crafted IOCTL signal can cause an access violation in KL1 kernel driver resulting in local system denial of service. An attacker can run a program from user-mode to trigger this vulnerability. | ||||
CVE-2016-4306 | 1 Kaspersky | 1 Total Security | 2024-11-21 | N/A |
Multiple information leaks exist in various IOCTL handlers of the Kaspersky Internet Security KLDISK driver. Specially crafted IOCTL requests can cause the driver to return out-of-bounds kernel memory, potentially leaking sensitive information such as privileged tokens or kernel memory addresses that may be useful in bypassing kernel mitigations. An unprivileged user can run a program from user-mode to trigger this vulnerability. | ||||
CVE-2016-4305 | 1 Kaspersky | 1 Internet Security | 2024-11-21 | N/A |
A denial of service vulnerability exists in the syscall filtering functionality of Kaspersky Internet Security KLIF driver. A specially crafted native api call can cause a access violation in KLIF kernel driver resulting in local denial of service. An attacker can run program from user-mode to trigger this vulnerability. |