Vulnerabilites related to k7computing - total_security
Vulnerability from fkie_nvd
Published
2018-01-16 19:29
Modified
2024-11-21 03:16
Severity ?
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivirus | * | |
k7computing | antivirus | * | |
k7computing | endpoint | * | |
k7computing | internet_security | * | |
k7computing | total_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:premium:*:*:*", "matchCriteriaId": "081BB6A6-F61D-4620-B7E3-D8D75D6FF45E", "versionEndExcluding": "15.1.0.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:plus:*:*:*", "matchCriteriaId": "E5B80AE6-80A8-4DD1-B80A-41376D5F4126", "versionEndExcluding": "15.1.0308", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:endpoint:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3C2065-FF01-4782-8737-AB7319D62F7D", "versionEndExcluding": "14.2.0137", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "853D8531-FDA6-480D-846B-DC7239D534FF", "versionEndExcluding": "15.1.0297", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE981E5-381A-4532-8EBD-5A404E72F8EB", "versionEndExcluding": "15.1.0324", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:plus:*:*:*", "matchCriteriaId": "6EC3E1A9-9A05-42BA-B614-125BE4B63436", "versionEndExcluding": "16.0.0131", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA207B19-FD5F-4CF5-9C77-74BBFEA49845", "versionEndExcluding": "15.1.0324", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way." }, { "lang": "es", "value": "K7 Antivirus Premium en versiones anteriores a la 15.1.0.53 permite que usuarios locales obtengan privilegios mediante el env\u00edo de una llamada IOCTL espec\u00edfica tras configurar la memoria de una forma en particular." } ], "id": "CVE-2017-16553", "lastModified": "2024-11-21T03:16:34.450", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-16T19:29:01.197", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-16 19:29
Modified
2024-11-21 03:17
Severity ?
Summary
In K7 Antivirus Premium before 15.1.0.53, user-controlled input to the K7Sentry device is not sufficiently authenticated: a local user with a LOW integrity process can access a raw hard disk by sending a specific IOCTL.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivirus | * | |
k7computing | antivirus | * | |
k7computing | endpoint | * | |
k7computing | internet_security | * | |
k7computing | total_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:premium:*:*:*", "matchCriteriaId": "081BB6A6-F61D-4620-B7E3-D8D75D6FF45E", "versionEndExcluding": "15.1.0.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:plus:*:*:*", "matchCriteriaId": "E5B80AE6-80A8-4DD1-B80A-41376D5F4126", "versionEndExcluding": "15.1.0308", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:endpoint:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3C2065-FF01-4782-8737-AB7319D62F7D", "versionEndExcluding": "14.2.0137", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "853D8531-FDA6-480D-846B-DC7239D534FF", "versionEndExcluding": "15.1.0297", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE981E5-381A-4532-8EBD-5A404E72F8EB", "versionEndExcluding": "15.1.0324", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:plus:*:*:*", "matchCriteriaId": "6EC3E1A9-9A05-42BA-B614-125BE4B63436", "versionEndExcluding": "16.0.0131", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA207B19-FD5F-4CF5-9C77-74BBFEA49845", "versionEndExcluding": "15.1.0324", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In K7 Antivirus Premium before 15.1.0.53, user-controlled input to the K7Sentry device is not sufficiently authenticated: a local user with a LOW integrity process can access a raw hard disk by sending a specific IOCTL." }, { "lang": "es", "value": "En K7 Antivirus Premium en versiones anteriores a la 15.1.0.53, las entradas controladas por el usuario en el dispositivo K7Sentry no se autentican lo suficiente: un usuario local con un proceso de BAJA integridad puede acceder a un disco duro en formato raw mediante el env\u00edo de una llamada IOCTL espec\u00edfica." } ], "id": "CVE-2017-17429", "lastModified": "2024-11-21T03:17:55.327", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-16T19:29:01.433", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-5th-December-2017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-5th-December-2017" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-11 16:15
Modified
2024-11-21 03:42
Severity ?
Summary
A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
cve@mitre.org | https://www.k7computing.com | Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.k7computing.com | Product, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivrius | * | |
k7computing | enterprise_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*", "matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511", "versionEndExcluding": "14.2.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76", "versionEndExcluding": "16.0.0001", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." }, { "lang": "es", "value": "Se detect\u00f3 un problema de p\u00e9rdida de memoria en K7Computing K7AntiVirus Premium versi\u00f3n 15.01.00.53" } ], "id": "CVE-2018-11005", "lastModified": "2024-11-21T03:42:28.677", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-11T16:15:12.727", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.k7computing.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.k7computing.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-11 16:15
Modified
2024-11-21 04:14
Severity ?
Summary
K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivrius | * | |
k7computing | enterprise_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*", "matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511", "versionEndExcluding": "14.2.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76", "versionEndExcluding": "16.0.0001", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe." }, { "lang": "es", "value": "K7Computing Pvt Ltd K7AntiVirus Premium versi\u00f3n 15.01.00.53, est\u00e1 afectado por: un Desbordamiento del B\u00fafer.\u0026#xa0;El impacto es: ejecutar c\u00f3digo arbitrario (local).\u0026#xa0;El componente es: el archivo K7TSMngr.exe" } ], "id": "CVE-2018-8725", "lastModified": "2024-11-21T04:14:12.920", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-11T16:15:13.337", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://k7antivirus.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://k7computing.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://k7antivirus.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://k7computing.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-16 19:29
Modified
2024-11-21 03:16
Severity ?
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivirus | * | |
k7computing | antivirus | * | |
k7computing | endpoint | * | |
k7computing | internet_security | * | |
k7computing | total_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:premium:*:*:*", "matchCriteriaId": "081BB6A6-F61D-4620-B7E3-D8D75D6FF45E", "versionEndExcluding": "15.1.0.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:plus:*:*:*", "matchCriteriaId": "E5B80AE6-80A8-4DD1-B80A-41376D5F4126", "versionEndExcluding": "15.1.0308", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:endpoint:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3C2065-FF01-4782-8737-AB7319D62F7D", "versionEndExcluding": "14.2.0137", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "853D8531-FDA6-480D-846B-DC7239D534FF", "versionEndExcluding": "15.1.0297", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE981E5-381A-4532-8EBD-5A404E72F8EB", "versionEndExcluding": "15.1.0324", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:plus:*:*:*", "matchCriteriaId": "6EC3E1A9-9A05-42BA-B614-125BE4B63436", "versionEndExcluding": "16.0.0131", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA207B19-FD5F-4CF5-9C77-74BBFEA49845", "versionEndExcluding": "15.1.0324", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way." }, { "lang": "es", "value": "K7 Antivirus Premium en versiones anteriores a la 15.1.0.53 permite que usuarios locales obtengan privilegios mediante el env\u00edo de una llamada IOCTL espec\u00edfica tras configurar la memoria de una forma en particular." } ], "id": "CVE-2017-16551", "lastModified": "2024-11-21T03:16:34.167", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-16T19:29:01.107", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-11 16:15
Modified
2024-11-21 04:15
Severity ?
Summary
K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivrius | * | |
k7computing | enterprise_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*", "matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511", "versionEndExcluding": "14.2.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76", "versionEndExcluding": "16.0.0001", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe." }, { "lang": "es", "value": "K7Computing Pvt Ltd K7AntiVirus Premium versi\u00f3n 15.1.0.53, est\u00e1 afectado por: un Desbordamiento de B\u00fafer.\u0026#xa0;El impacto es: ejecutar c\u00f3digo arbitrario (local).\u0026#xa0;El componente es: el archivo K7TSMngr.exe" } ], "id": "CVE-2018-9333", "lastModified": "2024-11-21T04:15:21.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-11T16:15:13.587", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://k7antivirus.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://k7computing.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://k7antivirus.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://k7computing.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" }, { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-11 16:15
Modified
2024-11-21 04:13
Severity ?
Summary
K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivrius | * | |
k7computing | enterprise_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*", "matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511", "versionEndExcluding": "14.2.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76", "versionEndExcluding": "16.0.0001", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys." }, { "lang": "es", "value": "K7Computing Pvt Ltd K7Antivirus Premium versi\u00f3n 15.1.0.53, est\u00e1 afectado por: un Control de acceso incorrecto.\u0026#xa0;El impacto es: una Ejecuci\u00f3n de Procesos Locales (local).\u0026#xa0;El componente es: la biblioteca K7Sentry.sys" } ], "id": "CVE-2018-8044", "lastModified": "2024-11-21T04:13:10.273", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-11T16:15:13.180", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://k7antivirus.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://k7computing.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://k7antivirus.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://k7computing.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" }, { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-16 19:29
Modified
2024-11-21 03:16
Severity ?
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivirus | * | |
k7computing | antivirus | * | |
k7computing | endpoint | * | |
k7computing | internet_security | * | |
k7computing | total_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:premium:*:*:*", "matchCriteriaId": "081BB6A6-F61D-4620-B7E3-D8D75D6FF45E", "versionEndExcluding": "15.1.0.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:plus:*:*:*", "matchCriteriaId": "E5B80AE6-80A8-4DD1-B80A-41376D5F4126", "versionEndExcluding": "15.1.0308", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:endpoint:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3C2065-FF01-4782-8737-AB7319D62F7D", "versionEndExcluding": "14.2.0137", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "853D8531-FDA6-480D-846B-DC7239D534FF", "versionEndExcluding": "15.1.0297", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE981E5-381A-4532-8EBD-5A404E72F8EB", "versionEndExcluding": "15.1.0324", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:plus:*:*:*", "matchCriteriaId": "6EC3E1A9-9A05-42BA-B614-125BE4B63436", "versionEndExcluding": "16.0.0131", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA207B19-FD5F-4CF5-9C77-74BBFEA49845", "versionEndExcluding": "15.1.0324", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way." }, { "lang": "es", "value": "K7 Antivirus Premium en versiones anteriores a la 15.1.0.53 permite que usuarios locales obtengan privilegios mediante el env\u00edo de una llamada IOCTL espec\u00edfica tras configurar la memoria de una forma en particular." } ], "id": "CVE-2017-16557", "lastModified": "2024-11-21T03:16:35.037", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-16T19:29:01.400", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-11 16:15
Modified
2024-11-21 03:42
Severity ?
Summary
An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
cve@mitre.org | https://www.k7computing.com | Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.k7computing.com | Product, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivrius | * | |
k7computing | enterprise_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*", "matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511", "versionEndExcluding": "14.2.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76", "versionEndExcluding": "16.0.0001", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." }, { "lang": "es", "value": "Se detect\u00f3 un problema de Control de Acceso Incorrecto en K7Computing K7AntiVirus Premium versi\u00f3n 15.01.00.53" } ], "id": "CVE-2018-11006", "lastModified": "2024-11-21T03:42:28.833", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.8, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-11T16:15:12.773", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.k7computing.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.k7computing.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-11 16:15
Modified
2024-11-21 04:15
Severity ?
Summary
K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivrius | * | |
k7computing | enterprise_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*", "matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511", "versionEndExcluding": "14.2.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76", "versionEndExcluding": "16.0.0001", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local)." }, { "lang": "es", "value": "K7Computing Pvt Ltd K7AntiVirus Premium versi\u00f3n 15.01.00.53, est\u00e1 afectado por: un Control de Acceso Incorrecto.\u0026#xa0;El impacto es: alcanzar privilegios (local)" } ], "id": "CVE-2018-9332", "lastModified": "2024-11-21T04:15:20.930", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-11T16:15:13.493", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://k7antivirus.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://k7computing.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://k7antivirus.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://k7computing.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-04 04:29
Modified
2024-11-21 03:19
Severity ?
Summary
In K7 Total Security before 15.1.0.305, user-controlled input to the K7Sentry device is not sufficiently sanitized: the user-controlled input can be used to compare an arbitrary memory address with a fixed value, which in turn can be used to read the contents of arbitrary memory. Similarly, the product crashes upon a \\.\K7Sentry DeviceIoControl call with an invalid kernel pointer.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blogs.securiteam.com/index.php/archives/3435 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blogs.securiteam.com/index.php/archives/3435 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | total_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "81F96360-A226-4B7B-8EC1-C7478205424C", "versionEndExcluding": "15.1.0.305", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In K7 Total Security before 15.1.0.305, user-controlled input to the K7Sentry device is not sufficiently sanitized: the user-controlled input can be used to compare an arbitrary memory address with a fixed value, which in turn can be used to read the contents of arbitrary memory. Similarly, the product crashes upon a \\\\.\\K7Sentry DeviceIoControl call with an invalid kernel pointer." }, { "lang": "es", "value": "En K7 Total Security en versiones anteriores a la 15.1.0.305, las entradas controladas por el usuario en el dispositivo K7Sentry no est\u00e1n suficientemente saneadas: las entradas controladas por el usuario se pueden utilizar para comparar una direcci\u00f3n de memoria arbitraria con un valor fijo, que a su vez se puede usar para leer contenidos de memoria arbitraria. De manera similar, el producto se cierra de manera inesperada despu\u00e9s de que se realice una llamada \\\\.\\K7Sentry DeviceIoControl con un puntero de kernel no v\u00e1lido." } ], "id": "CVE-2017-18019", "lastModified": "2024-11-21T03:19:10.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-04T04:29:00.220", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://blogs.securiteam.com/index.php/archives/3435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blogs.securiteam.com/index.php/archives/3435" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-02-06 15:59
Modified
2025-04-12 10:46
Severity ?
Summary
K7Sentry.sys in K7 Computing Ultimate Security, Anti-Virus Plus, and Total Security before 14.2.0.253 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x95002570, 0x95002574, 0x95002580, 0x950025a8, 0x950025ac, or 0x950025c8 IOCTL call.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | k7sentry.sys | * | |
k7computing | anti-virus_plus | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:k7sentry.sys:*:*:*:*:*:*:*:*", "matchCriteriaId": "17C91E6D-D5E7-44BA-AFF2-4F15310214F8", "versionEndIncluding": "12.8.0.117", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:anti-virus_plus:*:*:*:*:*:*:*:*", "matchCriteriaId": "C242D193-E0BE-41D5-B322-5E6EAF7B0A02", "versionEndIncluding": "14.2.0.252", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F508ABB-EA38-480A-B01E-058F833F550A", "versionEndIncluding": "14.2.0.252", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE14BB8C-346A-4AC1-B1F4-5B33349EE4C4", "versionEndIncluding": "14.2.0.252", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7Sentry.sys in K7 Computing Ultimate Security, Anti-Virus Plus, and Total Security before 14.2.0.253 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x95002570, 0x95002574, 0x95002580, 0x950025a8, 0x950025ac, or 0x950025c8 IOCTL call." }, { "lang": "es", "value": "K7Sentry.sys en K7 Computing Ultimate Security, Anti-Virus Plus, y Total Security anterior a 14.2.0.253 permite a usuarios locales escribir a localizaciones de memoria arbitrarias, y como consecuencia ganar privilegios, a trav\u00e9s de una llamada IOCTL 0x95002570, 0x95002574, 0x95002580, 0x950025a8, 0x950025ac, o 0x950025c8 manipulada." } ], "id": "CVE-2014-9643", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-02-06T15:59:11.477", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/130246/K7-Computing-14.2.0.240-Privilege-Escalation.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/35992" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.greyhathacker.net/?p=818" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/113007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.com/files/130246/K7-Computing-14.2.0.240-Privilege-Escalation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/35992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.greyhathacker.net/?p=818" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/113007" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-16 19:29
Modified
2024-11-21 03:16
Severity ?
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivirus | * | |
k7computing | antivirus | * | |
k7computing | endpoint | * | |
k7computing | internet_security | * | |
k7computing | total_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:premium:*:*:*", "matchCriteriaId": "081BB6A6-F61D-4620-B7E3-D8D75D6FF45E", "versionEndExcluding": "15.1.0.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:plus:*:*:*", "matchCriteriaId": "E5B80AE6-80A8-4DD1-B80A-41376D5F4126", "versionEndExcluding": "15.1.0308", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:endpoint:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3C2065-FF01-4782-8737-AB7319D62F7D", "versionEndExcluding": "14.2.0137", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "853D8531-FDA6-480D-846B-DC7239D534FF", "versionEndExcluding": "15.1.0297", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE981E5-381A-4532-8EBD-5A404E72F8EB", "versionEndExcluding": "15.1.0324", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:plus:*:*:*", "matchCriteriaId": "6EC3E1A9-9A05-42BA-B614-125BE4B63436", "versionEndExcluding": "16.0.0131", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA207B19-FD5F-4CF5-9C77-74BBFEA49845", "versionEndExcluding": "15.1.0324", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way." }, { "lang": "es", "value": "K7 Antivirus Premium en versiones anteriores a la 15.1.0.53 permite que usuarios locales obtengan privilegios mediante el env\u00edo de una llamada IOCTL espec\u00edfica tras configurar la memoria de una forma en particular." } ], "id": "CVE-2017-16555", "lastModified": "2024-11-21T03:16:34.743", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-16T19:29:01.293", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-11 16:15
Modified
2024-11-21 03:42
Severity ?
Summary
A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
cve@mitre.org | https://www.k7computing.com | Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.k7computing.com | Product, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivrius | * | |
k7computing | enterprise_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*", "matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511", "versionEndExcluding": "14.2.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76", "versionEndExcluding": "16.0.0001", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." }, { "lang": "es", "value": "Se detect\u00f3 un problema de desbordamiento del b\u00fafer en K7Computing K7AntiVirus Premium versi\u00f3n 15.01.00.53" } ], "id": "CVE-2018-11009", "lastModified": "2024-11-21T03:42:29.280", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-11T16:15:12.930", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.k7computing.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.k7computing.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-11 16:15
Modified
2024-11-21 04:14
Severity ?
Summary
K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivrius | * | |
k7computing | enterprise_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*", "matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511", "versionEndExcluding": "14.2.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76", "versionEndExcluding": "16.0.0001", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe." }, { "lang": "es", "value": "K7Computing Pvt Ltd K7Antivirus Premium versi\u00f3n 15.1.0.53, est\u00e1 afectado por: Desbordamiento de B\u00fafer.\u0026#xa0;El impacto es: ejecutar c\u00f3digo arbitrario (local).\u0026#xa0;El componente es: Archivo K7TSMngr.exe" } ], "id": "CVE-2018-8726", "lastModified": "2024-11-21T04:14:13.083", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-11T16:15:13.413", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://k7antivirus.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://k7computing.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://k7antivirus.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://k7computing.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-11 16:15
Modified
2024-11-21 03:42
Severity ?
Summary
An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
cve@mitre.org | https://www.k7computing.com | Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.k7computing.com | Product, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivrius | * | |
k7computing | enterprise_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*", "matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511", "versionEndExcluding": "14.2.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76", "versionEndExcluding": "16.0.0001", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." }, { "lang": "es", "value": "Se detect\u00f3 un problema de Control de Acceso incorrecto en K7Computing K7AntiVirus Premium versi\u00f3n 15.01.00.53" } ], "id": "CVE-2018-11008", "lastModified": "2024-11-21T03:42:29.133", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-11T16:15:12.883", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.k7computing.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.k7computing.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-16 19:29
Modified
2024-11-21 03:16
Severity ?
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivirus | * | |
k7computing | antivirus | * | |
k7computing | endpoint | * | |
k7computing | internet_security | * | |
k7computing | total_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:premium:*:*:*", "matchCriteriaId": "081BB6A6-F61D-4620-B7E3-D8D75D6FF45E", "versionEndExcluding": "15.1.0.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:plus:*:*:*", "matchCriteriaId": "E5B80AE6-80A8-4DD1-B80A-41376D5F4126", "versionEndExcluding": "15.1.0308", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:endpoint:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3C2065-FF01-4782-8737-AB7319D62F7D", "versionEndExcluding": "14.2.0137", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "853D8531-FDA6-480D-846B-DC7239D534FF", "versionEndExcluding": "15.1.0297", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE981E5-381A-4532-8EBD-5A404E72F8EB", "versionEndExcluding": "15.1.0324", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:plus:*:*:*", "matchCriteriaId": "6EC3E1A9-9A05-42BA-B614-125BE4B63436", "versionEndExcluding": "16.0.0131", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA207B19-FD5F-4CF5-9C77-74BBFEA49845", "versionEndExcluding": "15.1.0324", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls." }, { "lang": "es", "value": "K7 Antivirus Premium en versiones anteriores a la 15.1.0.53 permite que usuarios locales escriban en ubicaciones aleatorias de la memoria y, consecuentemente, obtengan privilegios mediante un conjunto espec\u00edfico de llamadas IOCTL." } ], "id": "CVE-2017-16549", "lastModified": "2024-11-21T03:16:33.880", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-16T19:29:01.027", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/Knowledgebase/Article/View/173/41/advisory-issued-on-6th-november-2017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/Knowledgebase/Article/View/173/41/advisory-issued-on-6th-november-2017" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-16 19:29
Modified
2024-11-21 03:16
Severity ?
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivirus | * | |
k7computing | antivirus | * | |
k7computing | endpoint | * | |
k7computing | internet_security | * | |
k7computing | total_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:premium:*:*:*", "matchCriteriaId": "081BB6A6-F61D-4620-B7E3-D8D75D6FF45E", "versionEndExcluding": "15.1.0.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:plus:*:*:*", "matchCriteriaId": "E5B80AE6-80A8-4DD1-B80A-41376D5F4126", "versionEndExcluding": "15.1.0308", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:endpoint:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3C2065-FF01-4782-8737-AB7319D62F7D", "versionEndExcluding": "14.2.0137", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "853D8531-FDA6-480D-846B-DC7239D534FF", "versionEndExcluding": "15.1.0297", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE981E5-381A-4532-8EBD-5A404E72F8EB", "versionEndExcluding": "15.1.0324", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:plus:*:*:*", "matchCriteriaId": "6EC3E1A9-9A05-42BA-B614-125BE4B63436", "versionEndExcluding": "16.0.0131", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA207B19-FD5F-4CF5-9C77-74BBFEA49845", "versionEndExcluding": "15.1.0324", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls." }, { "lang": "es", "value": "K7 Antivirus Premium en versiones anteriores a la 15.1.0.53 permite que usuarios locales escriban en ubicaciones aleatorias de la memoria y, consecuentemente, obtengan privilegios mediante un conjunto espec\u00edfico de llamadas IOCTL." } ], "id": "CVE-2017-16554", "lastModified": "2024-11-21T03:16:34.597", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-16T19:29:01.247", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-11 16:15
Modified
2024-11-21 04:14
Severity ?
Summary
K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local). The component is: K7TSMngr.exe.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivrius | * | |
k7computing | enterprise_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*", "matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511", "versionEndExcluding": "14.2.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76", "versionEndExcluding": "16.0.0001", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local). The component is: K7TSMngr.exe." }, { "lang": "es", "value": "K7Computing Pvt Ltd K7AntiVirus Premium versi\u00f3n 15.1.0.53, est\u00e1 afectado por: un Control de acceso incorrecto.\u0026#xa0;El impacto es: alcanzar privilegios (local).\u0026#xa0;El componente es: el archivo K7TSMngr.exe" } ], "id": "CVE-2018-8724", "lastModified": "2024-11-21T04:14:12.770", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-11T16:15:13.257", "references": [ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://k7antivirus.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://k7computing.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://k7antivirus.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://k7computing.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" }, { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-16 19:29
Modified
2024-11-21 03:16
Severity ?
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivirus | * | |
k7computing | antivirus | * | |
k7computing | endpoint | * | |
k7computing | internet_security | * | |
k7computing | total_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:premium:*:*:*", "matchCriteriaId": "081BB6A6-F61D-4620-B7E3-D8D75D6FF45E", "versionEndExcluding": "15.1.0.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:plus:*:*:*", "matchCriteriaId": "E5B80AE6-80A8-4DD1-B80A-41376D5F4126", "versionEndExcluding": "15.1.0308", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:endpoint:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3C2065-FF01-4782-8737-AB7319D62F7D", "versionEndExcluding": "14.2.0137", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "853D8531-FDA6-480D-846B-DC7239D534FF", "versionEndExcluding": "15.1.0297", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE981E5-381A-4532-8EBD-5A404E72F8EB", "versionEndExcluding": "15.1.0324", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:plus:*:*:*", "matchCriteriaId": "6EC3E1A9-9A05-42BA-B614-125BE4B63436", "versionEndExcluding": "16.0.0131", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA207B19-FD5F-4CF5-9C77-74BBFEA49845", "versionEndExcluding": "15.1.0324", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls." }, { "lang": "es", "value": "K7 Antivirus Premium en versiones anteriores a la 15.1.0.53 permite que usuarios locales escriban en ubicaciones aleatorias de la memoria y, consecuentemente, obtengan privilegios mediante un conjunto espec\u00edfico de llamadas IOCTL." } ], "id": "CVE-2017-16550", "lastModified": "2024-11-21T03:16:34.023", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-16T19:29:01.057", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-16 19:29
Modified
2024-11-21 03:16
Severity ?
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivirus | * | |
k7computing | antivirus | * | |
k7computing | endpoint | * | |
k7computing | internet_security | * | |
k7computing | total_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:premium:*:*:*", "matchCriteriaId": "081BB6A6-F61D-4620-B7E3-D8D75D6FF45E", "versionEndExcluding": "15.1.0.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:plus:*:*:*", "matchCriteriaId": "E5B80AE6-80A8-4DD1-B80A-41376D5F4126", "versionEndExcluding": "15.1.0308", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:endpoint:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3C2065-FF01-4782-8737-AB7319D62F7D", "versionEndExcluding": "14.2.0137", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "853D8531-FDA6-480D-846B-DC7239D534FF", "versionEndExcluding": "15.1.0297", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE981E5-381A-4532-8EBD-5A404E72F8EB", "versionEndExcluding": "15.1.0324", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:plus:*:*:*", "matchCriteriaId": "6EC3E1A9-9A05-42BA-B614-125BE4B63436", "versionEndExcluding": "16.0.0131", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA207B19-FD5F-4CF5-9C77-74BBFEA49845", "versionEndExcluding": "15.1.0324", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls." }, { "lang": "es", "value": "K7 Antivirus Premium en versiones anteriores a la 15.1.0.53 permite que usuarios locales escriban en ubicaciones aleatorias de la memoria y, consecuentemente, obtengan privilegios mediante un conjunto espec\u00edfico de llamadas IOCTL." } ], "id": "CVE-2017-16552", "lastModified": "2024-11-21T03:16:34.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-16T19:29:01.150", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-11 16:15
Modified
2024-11-21 03:42
Severity ?
Summary
K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivrius | * | |
k7computing | enterprise_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*", "matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511", "versionEndExcluding": "14.2.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76", "versionEndExcluding": "16.0.0001", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak." }, { "lang": "es", "value": "K7TSMngr.exe en K7Computing K7AntiVirus Premium versi\u00f3n 15.1.0.53, presenta una fuga de la memoria" } ], "id": "CVE-2018-11246", "lastModified": "2024-11-21T03:42:59.277", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-11T16:15:13.103", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.k7computing.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.k7computing.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-11 16:15
Modified
2024-11-21 03:42
Severity ?
Summary
A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
cve@mitre.org | https://www.k7computing.com | Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.k7computing.com | Product, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivrius | * | |
k7computing | enterprise_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*", "matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511", "versionEndExcluding": "14.2.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76", "versionEndExcluding": "16.0.0001", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." }, { "lang": "es", "value": "Se detect\u00f3 un problema de p\u00e9rdida de memoria en K7Computing K7AntiVirus Premium versi\u00f3n 15.01.00.53" } ], "id": "CVE-2018-11007", "lastModified": "2024-11-21T03:42:28.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-11T16:15:12.820", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.k7computing.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.k7computing.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-01-11 16:15
Modified
2024-11-21 03:42
Severity ?
Summary
A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
cve@mitre.org | https://www.k7computing.com | Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.k7computing.com | Product, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivrius | * | |
k7computing | enterprise_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*", "matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511", "versionEndExcluding": "14.2.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB", "versionEndExcluding": "16.0.0001", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76", "versionEndExcluding": "16.0.0001", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." }, { "lang": "es", "value": "Se detect\u00f3 un problema de desbordamiento del b\u00fafer en K7Computing K7AntiVirus Premium versi\u00f3n 15.01.00.53" } ], "id": "CVE-2018-11010", "lastModified": "2024-11-21T03:42:29.437", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-01-11T16:15:12.993", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.k7computing.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.k7computing.com" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-16 19:29
Modified
2024-11-21 03:16
Severity ?
Summary
In K7 Antivirus Premium before 15.1.0.53, user-controlled input can be used to allow local users to write to arbitrary memory locations.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
k7computing | antivirus | * | |
k7computing | antivirus | * | |
k7computing | endpoint | * | |
k7computing | internet_security | * | |
k7computing | total_security | * | |
k7computing | total_security | * | |
k7computing | ultimate_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:premium:*:*:*", "matchCriteriaId": "081BB6A6-F61D-4620-B7E3-D8D75D6FF45E", "versionEndExcluding": "15.1.0.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:antivirus:*:*:*:*:plus:*:*:*", "matchCriteriaId": "E5B80AE6-80A8-4DD1-B80A-41376D5F4126", "versionEndExcluding": "15.1.0308", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:endpoint:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3C2065-FF01-4782-8737-AB7319D62F7D", "versionEndExcluding": "14.2.0137", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:internet_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "853D8531-FDA6-480D-846B-DC7239D534FF", "versionEndExcluding": "15.1.0297", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE981E5-381A-4532-8EBD-5A404E72F8EB", "versionEndExcluding": "15.1.0324", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:plus:*:*:*", "matchCriteriaId": "6EC3E1A9-9A05-42BA-B614-125BE4B63436", "versionEndExcluding": "16.0.0131", "vulnerable": true }, { "criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA207B19-FD5F-4CF5-9C77-74BBFEA49845", "versionEndExcluding": "15.1.0324", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In K7 Antivirus Premium before 15.1.0.53, user-controlled input can be used to allow local users to write to arbitrary memory locations." }, { "lang": "es", "value": "En K7 Antivirus Premium en versiones anteriores a la 15.1.0.53, las entradas controladas por el usuario pueden emplearse para permitir que usuarios locales escriban en ubicaciones arbitrarias de la memoria." } ], "id": "CVE-2017-16556", "lastModified": "2024-11-21T03:16:34.890", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-16T19:29:01.340", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/2nd-Advisory-issued-on-6th-November-2017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/2nd-Advisory-issued-on-6th-November-2017" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2018-9332 (GCVE-0-2018-9332)
Vulnerability from cvelistv5
Published
2021-01-11 15:31
Modified
2024-08-05 07:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local).
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:17:52.061Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://k7computing.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://k7antivirus.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-11T15:31:38", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://k7computing.com" }, { "tags": [ "x_refsource_MISC" ], "url": "http://k7antivirus.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-9332", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://k7computing.com", "refsource": "MISC", "url": "http://k7computing.com" }, { "name": "http://k7antivirus.com", "refsource": "MISC", "url": "http://k7antivirus.com" }, { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-9332", "datePublished": "2021-01-11T15:31:38", "dateReserved": "2018-04-05T00:00:00", "dateUpdated": "2024-08-05T07:17:52.061Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-16556 (GCVE-0-2017-16556)
Vulnerability from cvelistv5
Published
2018-01-16 19:00
Modified
2024-08-05 20:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In K7 Antivirus Premium before 15.1.0.53, user-controlled input can be used to allow local users to write to arbitrary memory locations.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:27:04.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/2nd-Advisory-issued-on-6th-November-2017" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "In K7 Antivirus Premium before 15.1.0.53, user-controlled input can be used to allow local users to write to arbitrary memory locations." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-05T23:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/2nd-Advisory-issued-on-6th-November-2017" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16556", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In K7 Antivirus Premium before 15.1.0.53, user-controlled input can be used to allow local users to write to arbitrary memory locations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/2nd-Advisory-issued-on-6th-November-2017", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/2nd-Advisory-issued-on-6th-November-2017" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16556", "datePublished": "2018-01-16T19:00:00", "dateReserved": "2017-11-06T00:00:00", "dateUpdated": "2024-08-05T20:27:04.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-8724 (GCVE-0-2018-8724)
Vulnerability from cvelistv5
Published
2021-01-11 15:34
Modified
2024-08-05 07:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local). The component is: K7TSMngr.exe.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:02:26.022Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://k7computing.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://k7antivirus.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local). The component is: K7TSMngr.exe." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-11T15:34:26", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://k7computing.com" }, { "tags": [ "x_refsource_MISC" ], "url": "http://k7antivirus.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-8724", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local). The component is: K7TSMngr.exe." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://k7computing.com", "refsource": "MISC", "url": "http://k7computing.com" }, { "name": "http://k7antivirus.com", "refsource": "MISC", "url": "http://k7antivirus.com" }, { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-8724", "datePublished": "2021-01-11T15:34:26", "dateReserved": "2018-03-15T00:00:00", "dateUpdated": "2024-08-05T07:02:26.022Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-8044 (GCVE-0-2018-8044)
Vulnerability from cvelistv5
Published
2021-01-11 15:36
Modified
2024-08-05 06:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:46:11.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://k7computing.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://k7antivirus.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-11T15:36:36", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://k7computing.com" }, { "tags": [ "x_refsource_MISC" ], "url": "http://k7antivirus.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-8044", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://k7computing.com", "refsource": "MISC", "url": "http://k7computing.com" }, { "name": "http://k7antivirus.com", "refsource": "MISC", "url": "http://k7antivirus.com" }, { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-8044", "datePublished": "2021-01-11T15:36:36", "dateReserved": "2018-03-10T00:00:00", "dateUpdated": "2024-08-05T06:46:11.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11010 (GCVE-0-2018-11010)
Vulnerability from cvelistv5
Published
2021-01-11 15:42
Modified
2024-08-05 07:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:36.467Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.k7computing.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-11T15:42:28", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.k7computing.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.k7computing.com", "refsource": "MISC", "url": "https://www.k7computing.com" }, { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-11010", "datePublished": "2021-01-11T15:42:28", "dateReserved": "2018-05-11T00:00:00", "dateUpdated": "2024-08-05T07:54:36.467Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11005 (GCVE-0-2018-11005)
Vulnerability from cvelistv5
Published
2021-01-11 15:41
Modified
2024-08-05 07:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:36.477Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.k7computing.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-11T15:41:32", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.k7computing.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.k7computing.com", "refsource": "MISC", "url": "https://www.k7computing.com" }, { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-11005", "datePublished": "2021-01-11T15:41:32", "dateReserved": "2018-05-11T00:00:00", "dateUpdated": "2024-08-05T07:54:36.477Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-9643 (GCVE-0-2014-9643)
Vulnerability from cvelistv5
Published
2015-02-06 15:00
Modified
2024-08-06 13:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7Sentry.sys in K7 Computing Ultimate Security, Anti-Virus Plus, and Total Security before 14.2.0.253 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x95002570, 0x95002574, 0x95002580, 0x950025a8, 0x950025ac, or 0x950025c8 IOCTL call.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.976Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.greyhathacker.net/?p=818" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/130246/K7-Computing-14.2.0.240-Privilege-Escalation.html" }, { "name": "113007", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/113007" }, { "name": "35992", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/35992" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-01-28T00:00:00", "descriptions": [ { "lang": "en", "value": "K7Sentry.sys in K7 Computing Ultimate Security, Anti-Virus Plus, and Total Security before 14.2.0.253 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x95002570, 0x95002574, 0x95002580, 0x950025a8, 0x950025ac, or 0x950025c8 IOCTL call." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-02-06T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.greyhathacker.net/?p=818" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/130246/K7-Computing-14.2.0.240-Privilege-Escalation.html" }, { "name": "113007", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/113007" }, { "name": "35992", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/35992" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9643", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7Sentry.sys in K7 Computing Ultimate Security, Anti-Virus Plus, and Total Security before 14.2.0.253 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x95002570, 0x95002574, 0x95002580, 0x950025a8, 0x950025ac, or 0x950025c8 IOCTL call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.greyhathacker.net/?p=818", "refsource": "MISC", "url": "http://www.greyhathacker.net/?p=818" }, { "name": "http://packetstormsecurity.com/files/130246/K7-Computing-14.2.0.240-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/130246/K7-Computing-14.2.0.240-Privilege-Escalation.html" }, { "name": "113007", "refsource": "OSVDB", "url": "http://www.osvdb.org/113007" }, { "name": "35992", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/35992" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9643", "datePublished": "2015-02-06T15:00:00", "dateReserved": "2015-01-22T00:00:00", "dateUpdated": "2024-08-06T13:47:41.976Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-18019 (GCVE-0-2017-18019)
Vulnerability from cvelistv5
Published
2018-01-04 04:00
Modified
2024-08-05 21:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In K7 Total Security before 15.1.0.305, user-controlled input to the K7Sentry device is not sufficiently sanitized: the user-controlled input can be used to compare an arbitrary memory address with a fixed value, which in turn can be used to read the contents of arbitrary memory. Similarly, the product crashes upon a \\.\K7Sentry DeviceIoControl call with an invalid kernel pointer.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T21:06:50.068Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blogs.securiteam.com/index.php/archives/3435" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-03T00:00:00", "descriptions": [ { "lang": "en", "value": "In K7 Total Security before 15.1.0.305, user-controlled input to the K7Sentry device is not sufficiently sanitized: the user-controlled input can be used to compare an arbitrary memory address with a fixed value, which in turn can be used to read the contents of arbitrary memory. Similarly, the product crashes upon a \\\\.\\K7Sentry DeviceIoControl call with an invalid kernel pointer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T03:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://blogs.securiteam.com/index.php/archives/3435" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-18019", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In K7 Total Security before 15.1.0.305, user-controlled input to the K7Sentry device is not sufficiently sanitized: the user-controlled input can be used to compare an arbitrary memory address with a fixed value, which in turn can be used to read the contents of arbitrary memory. Similarly, the product crashes upon a \\\\.\\K7Sentry DeviceIoControl call with an invalid kernel pointer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blogs.securiteam.com/index.php/archives/3435", "refsource": "MISC", "url": "https://blogs.securiteam.com/index.php/archives/3435" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-18019", "datePublished": "2018-01-04T04:00:00", "dateReserved": "2018-01-03T00:00:00", "dateUpdated": "2024-08-05T21:06:50.068Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-8726 (GCVE-0-2018-8726)
Vulnerability from cvelistv5
Published
2021-01-11 15:35
Modified
2024-08-05 07:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:02:26.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://k7computing.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://k7antivirus.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-11T15:35:52", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://k7computing.com" }, { "tags": [ "x_refsource_MISC" ], "url": "http://k7antivirus.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-8726", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://k7computing.com", "refsource": "MISC", "url": "http://k7computing.com" }, { "name": "http://k7antivirus.com", "refsource": "MISC", "url": "http://k7antivirus.com" }, { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-8726", "datePublished": "2021-01-11T15:35:52", "dateReserved": "2018-03-15T00:00:00", "dateUpdated": "2024-08-05T07:02:26.024Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-16553 (GCVE-0-2017-16553)
Vulnerability from cvelistv5
Published
2018-01-16 19:00
Modified
2024-08-05 20:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:27:03.953Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-05T23:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16553", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16553", "datePublished": "2018-01-16T19:00:00", "dateReserved": "2017-11-06T00:00:00", "dateUpdated": "2024-08-05T20:27:03.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-16557 (GCVE-0-2017-16557)
Vulnerability from cvelistv5
Published
2018-01-16 19:00
Modified
2024-08-05 20:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:27:04.242Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-05T23:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16557", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16557", "datePublished": "2018-01-16T19:00:00", "dateReserved": "2017-11-06T00:00:00", "dateUpdated": "2024-08-05T20:27:04.242Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11246 (GCVE-0-2018-11246)
Vulnerability from cvelistv5
Published
2021-01-11 15:43
Modified
2024-08-05 08:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:01:52.848Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.k7computing.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-11T15:43:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.k7computing.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11246", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.k7computing.com", "refsource": "MISC", "url": "https://www.k7computing.com" }, { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-11246", "datePublished": "2021-01-11T15:43:01", "dateReserved": "2018-05-18T00:00:00", "dateUpdated": "2024-08-05T08:01:52.848Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-16554 (GCVE-0-2017-16554)
Vulnerability from cvelistv5
Published
2018-01-16 19:00
Modified
2024-08-05 20:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:27:04.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-05T23:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16554", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16554", "datePublished": "2018-01-16T19:00:00", "dateReserved": "2017-11-06T00:00:00", "dateUpdated": "2024-08-05T20:27:04.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11008 (GCVE-0-2018-11008)
Vulnerability from cvelistv5
Published
2021-01-11 15:39
Modified
2024-08-05 07:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:36.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.k7computing.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-11T15:39:26", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.k7computing.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.k7computing.com", "refsource": "MISC", "url": "https://www.k7computing.com" }, { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-11008", "datePublished": "2021-01-11T15:39:26", "dateReserved": "2018-05-11T00:00:00", "dateUpdated": "2024-08-05T07:54:36.626Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11006 (GCVE-0-2018-11006)
Vulnerability from cvelistv5
Published
2021-01-11 15:38
Modified
2024-08-05 07:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:36.226Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.k7computing.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-11T15:38:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.k7computing.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.k7computing.com", "refsource": "MISC", "url": "https://www.k7computing.com" }, { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-11006", "datePublished": "2021-01-11T15:38:25", "dateReserved": "2018-05-11T00:00:00", "dateUpdated": "2024-08-05T07:54:36.226Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-16550 (GCVE-0-2017-16550)
Vulnerability from cvelistv5
Published
2018-01-16 19:00
Modified
2024-08-05 20:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:27:04.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-05T23:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16550", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16550", "datePublished": "2018-01-16T19:00:00", "dateReserved": "2017-11-06T00:00:00", "dateUpdated": "2024-08-05T20:27:04.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-16552 (GCVE-0-2017-16552)
Vulnerability from cvelistv5
Published
2018-01-16 19:00
Modified
2024-08-05 20:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:27:04.254Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-05T23:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16552", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-November-2017" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16552", "datePublished": "2018-01-16T19:00:00", "dateReserved": "2017-11-06T00:00:00", "dateUpdated": "2024-08-05T20:27:04.254Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-16555 (GCVE-0-2017-16555)
Vulnerability from cvelistv5
Published
2018-01-16 19:00
Modified
2024-08-05 20:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:27:03.904Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-05T23:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16555", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16555", "datePublished": "2018-01-16T19:00:00", "dateReserved": "2017-11-06T00:00:00", "dateUpdated": "2024-08-05T20:27:03.904Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-8725 (GCVE-0-2018-8725)
Vulnerability from cvelistv5
Published
2021-01-11 15:35
Modified
2024-08-05 07:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:02:26.037Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://k7computing.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://k7antivirus.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-11T15:35:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://k7computing.com" }, { "tags": [ "x_refsource_MISC" ], "url": "http://k7antivirus.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-8725", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://k7computing.com", "refsource": "MISC", "url": "http://k7computing.com" }, { "name": "http://k7antivirus.com", "refsource": "MISC", "url": "http://k7antivirus.com" }, { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-8725", "datePublished": "2021-01-11T15:35:19", "dateReserved": "2018-03-15T00:00:00", "dateUpdated": "2024-08-05T07:02:26.037Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11007 (GCVE-0-2018-11007)
Vulnerability from cvelistv5
Published
2021-01-11 15:41
Modified
2024-08-05 07:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:36.073Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.k7computing.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-11T15:41:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.k7computing.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.k7computing.com", "refsource": "MISC", "url": "https://www.k7computing.com" }, { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-11007", "datePublished": "2021-01-11T15:41:06", "dateReserved": "2018-05-11T00:00:00", "dateUpdated": "2024-08-05T07:54:36.073Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-16549 (GCVE-0-2017-16549)
Vulnerability from cvelistv5
Published
2018-01-16 19:00
Modified
2024-08-05 20:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:27:04.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/Knowledgebase/Article/View/173/41/advisory-issued-on-6th-november-2017" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-05T23:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/Knowledgebase/Article/View/173/41/advisory-issued-on-6th-november-2017" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16549", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to write to arbitrary memory locations, and consequently gain privileges, via a specific set of IOCTL calls." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.k7computing.com/index.php?/Knowledgebase/Article/View/173/41/advisory-issued-on-6th-november-2017", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/Knowledgebase/Article/View/173/41/advisory-issued-on-6th-november-2017" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16549", "datePublished": "2018-01-16T19:00:00", "dateReserved": "2017-11-06T00:00:00", "dateUpdated": "2024-08-05T20:27:04.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-17429 (GCVE-0-2017-17429)
Vulnerability from cvelistv5
Published
2018-01-16 19:00
Modified
2024-08-05 20:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In K7 Antivirus Premium before 15.1.0.53, user-controlled input to the K7Sentry device is not sufficiently authenticated: a local user with a LOW integrity process can access a raw hard disk by sending a specific IOCTL.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:51:31.309Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-5th-December-2017" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "In K7 Antivirus Premium before 15.1.0.53, user-controlled input to the K7Sentry device is not sufficiently authenticated: a local user with a LOW integrity process can access a raw hard disk by sending a specific IOCTL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-05T23:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-5th-December-2017" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-17429", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In K7 Antivirus Premium before 15.1.0.53, user-controlled input to the K7Sentry device is not sufficiently authenticated: a local user with a LOW integrity process can access a raw hard disk by sending a specific IOCTL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-5th-December-2017", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-5th-December-2017" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-17429", "datePublished": "2018-01-16T19:00:00", "dateReserved": "2017-12-05T00:00:00", "dateUpdated": "2024-08-05T20:51:31.309Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-11009 (GCVE-0-2018-11009)
Vulnerability from cvelistv5
Published
2021-01-11 15:40
Modified
2024-08-05 07:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:54:36.288Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.k7computing.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-11T15:40:34", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.k7computing.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.k7computing.com", "refsource": "MISC", "url": "https://www.k7computing.com" }, { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-11009", "datePublished": "2021-01-11T15:40:34", "dateReserved": "2018-05-11T00:00:00", "dateUpdated": "2024-08-05T07:54:36.288Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-9333 (GCVE-0-2018-9333)
Vulnerability from cvelistv5
Published
2021-01-11 15:33
Modified
2024-08-05 07:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:17:51.832Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://k7computing.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://k7antivirus.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-11T15:33:44", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://k7computing.com" }, { "tags": [ "x_refsource_MISC" ], "url": "http://k7antivirus.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-9333", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://k7computing.com", "refsource": "MISC", "url": "http://k7computing.com" }, { "name": "http://k7antivirus.com", "refsource": "MISC", "url": "http://k7antivirus.com" }, { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-9333", "datePublished": "2021-01-11T15:33:44", "dateReserved": "2018-04-05T00:00:00", "dateUpdated": "2024-08-05T07:17:51.832Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-16551 (GCVE-0-2017-16551)
Vulnerability from cvelistv5
Published
2018-01-16 19:00
Modified
2024-08-05 20:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:27:03.893Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-01-16T00:00:00", "descriptions": [ { "lang": "en", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-05T23:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16551", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "K7 Antivirus Premium before 15.1.0.53 allows local users to gain privileges by sending a specific IOCTL after setting the memory in a particular way." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017", "refsource": "CONFIRM", "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/3rd-Advisory-issued-on-6th-November-2017" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16551", "datePublished": "2018-01-16T19:00:00", "dateReserved": "2017-11-06T00:00:00", "dateUpdated": "2024-08-05T20:27:03.893Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }