Vulnerabilities (CVE)

Filtered by vendor Pandasecurity Subscribe
Filtered by product Panda Global Protection
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-12042 1 Pandasecurity 6 Panda Antivirus, Panda Antivirus Pro, Panda Dome and 3 more 2024-02-28 10.0 HIGH 9.8 CRITICAL
Insecure permissions of the section object Global\PandaDevicesAgentSharedMemory and the event Global\PandaDevicesAgentSharedMemoryChange in Panda products before 18.07.03 allow attackers to queue an event (as an encrypted JSON string) to the system service AgentSvc.exe, which leads to privilege escalation when the CmdLineExecute event is queued. This affects Panda Antivirus, Panda Antivirus Pro, Panda Dome, Panda Global Protection, Panda Gold Protection, and Panda Internet Security.
CVE-2018-6321 1 Pandasecurity 1 Panda Global Protection 2024-02-28 4.6 MEDIUM 7.8 HIGH
Unquoted Windows search path vulnerability in the panda_url_filtering service in Panda Global Protection 17.0.1 allows local users to gain privileges via a malicious artefact.
CVE-2018-6322 1 Pandasecurity 1 Panda Global Protection 2024-02-28 4.6 MEDIUM 7.8 HIGH
Panda Global Protection 17.0.1 allows local users to gain privileges or cause a denial of service by impersonating all the pipes through a use of \.\pipe\PSANMSrvcPpal -- an "insecurely created named pipe." Ensures full access to Everyone users group.
CVE-2017-17683 1 Pandasecurity 1 Panda Global Protection 2024-02-28 7.8 HIGH 7.5 HIGH
Panda Global Protection 17.0.1 allows a system crash via a 0xb3702c44 \\.\PSMEMDriver DeviceIoControl request.
CVE-2017-17684 1 Pandasecurity 1 Panda Global Protection 2024-02-28 7.8 HIGH 7.5 HIGH
Panda Global Protection 17.0.1 allows a system crash via a 0xb3702c04 \\.\PSMEMDriver DeviceIoControl request.
CVE-2009-4215 2 Microsoft, Pandasecurity 6 Windows 7, Windows Vista, Windows Xp and 3 more 2024-02-28 7.2 HIGH N/A
Panda Global Protection 2010, Internet Security 2010, and Antivirus Pro 2010 use weak permissions (Everyone: Full Control) for the product files, which allows local users to gain privileges by replacing executables with Trojan horse programs.