Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Bitdefender
(Softwin)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2012-03-21 | CVE-2012-1429 | The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Secure Anti-Virus 9.0.16160.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, and nProtect Anti-Virus 2011-01-17.01 allows remote attackers to bypass malware detection via an ELF file with a ustar character sequence at a certain location. NOTE: this may later be SPLIT into... | Esafe, Comodo_antivirus, Anti\-Malware, F\-Secure_anti\-Virus, Ikarus_virus_utilities_t3_command_line_scanner, Gateway, Scan_engine, Nprotect_antivirus, Bitdefender | N/A | ||
2006-12-18 | CVE-2006-6627 | Integer overflow in the packed PE file parsing implementation in BitDefender products before 20060829, including Antivirus, Antivirus Plus, Internet Security, Mail Protection for Enterprises, and Online Scanner; and BitDefender products for Microsoft ISA Server and Exchange 5.5 through 2003; allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow, aka the "cevakrnl.xmd vulnerability." | Bitdefender, Bitdefender_antivirus, Bitdefender_internet_security, Bitdefender_mail_protection, Bitdefender_online_scanner | N/A | ||
2005-10-05 | CVE-2005-3154 | Format string vulnerability in the logging functionality in BitDefender AntiVirus 7.2 through 9 allows remote attackers to cause a denial of service and possibly execute arbitrary code via format string specifiers in file or directory name. | Bitdefender | N/A | ||
2004-04-19 | CVE-2004-1947 | The AVXSCANONLINE.AvxScanOnlineCtrl.1 ActiveX control in BitDefender Scan Online allows remote attackers to (1) obtain sensitive information such as system drives and contents or (2) use the RequestFile method to download and execute arbitrary code via an object codebase that uses bitdefender.cab. | Bitdefender | N/A |