Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Totaldefense Subscribe
Filtered by product Anti-virus
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-13355 1 Totaldefense 1 Anti-virus 2020-08-24 4.6 MEDIUM 7.8 HIGH
In Total Defense Anti-virus 9.0.0.773, insecure access control for the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\ used by ccschedulersvc.exe allows local attackers to hijack dotnetproxy.exe, which leads to privilege escalation when the ccSchedulerSVC service runs the executable.
CVE-2019-13356 1 Totaldefense 1 Anti-virus 2020-08-24 4.6 MEDIUM 7.8 HIGH
In Total Defense Anti-virus 9.0.0.773, insecure access control for the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\bd\TDUpdate2\ used by AMRT.exe allows local attackers to hijack bdcore.dll, which leads to privilege escalation when the AMRT service loads the DLL.
CVE-2019-18645 1 Totaldefense 1 Anti-virus 2020-08-24 2.1 LOW 5.5 MEDIUM
The quarantine restoration function in Total Defense Anti-virus 11.5.2.28 is vulnerable to symbolic link attacks, allowing files to be written to privileged directories.
CVE-2019-18644 1 Totaldefense 1 Anti-virus 2019-11-01 5.8 MEDIUM 5.9 MEDIUM
The malware scan function in Total Defense Anti-virus 11.5.2.28 is vulnerable to a TOCTOU bug; consequently, symbolic link attacks allow privileged files to be deleted.
CVE-2019-13357 1 Totaldefense 1 Anti-virus 2019-09-24 4.6 MEDIUM 7.8 HIGH
In Total Defense Anti-virus 9.0.0.773, resource acquisition from the untrusted search path C:\ used by caschelp.exe allows local attackers to hijack ccGUIFrm.dll, which leads to code execution. SYSTEM-level code execution can be achieved when the ccSchedulerSVC service runs the affected executable.