Lucene search

K
TotaldefenseAnti-virus

5 matches found

CVE
CVE
added 2019/10/31 12:15 a.m.91 views

CVE-2019-18645

The quarantine restoration function in Total Defense Anti-virus 11.5.2.28 is vulnerable to symbolic link attacks, allowing files to be written to privileged directories.

5.5CVSS5.4AI score0.00209EPSS
CVE
CVE
added 2019/10/31 12:15 a.m.86 views

CVE-2019-18644

The malware scan function in Total Defense Anti-virus 11.5.2.28 is vulnerable to a TOCTOU bug; consequently, symbolic link attacks allow privileged files to be deleted.

5.9CVSS5.6AI score0.00266EPSS
CVE
CVE
added 2019/09/24 3:15 p.m.33 views

CVE-2019-13355

In Total Defense Anti-virus 9.0.0.773, insecure access control for the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\ used by ccschedulersvc.exe allows local attackers to hijack dotnetproxy.exe, which leads to privilege escalation when the ccSchedulerSVC service runs the executable.

7.8CVSS7.7AI score0.00044EPSS
CVE
CVE
added 2019/09/24 3:15 p.m.33 views

CVE-2019-13356

In Total Defense Anti-virus 9.0.0.773, insecure access control for the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\bd\TDUpdate2\ used by AMRT.exe allows local attackers to hijack bdcore.dll, which leads to privilege escalation when the AMRT service loads the DLL.

7.8CVSS7.7AI score0.00044EPSS
CVE
CVE
added 2019/09/24 3:15 p.m.32 views

CVE-2019-13357

In Total Defense Anti-virus 9.0.0.773, resource acquisition from the untrusted search path C:\ used by caschelp.exe allows local attackers to hijack ccGUIFrm.dll, which leads to code execution. SYSTEM-level code execution can be achieved when the ccSchedulerSVC service runs the affected executable.

7.8CVSS7.8AI score0.00078EPSS