Search criteria
48 vulnerabilities found for comodo_internet_security by comodo
FKIE_CVE-2019-18215
Vulnerability from fkie_nvd - Published: 2019-11-18 20:15 - Updated: 2024-11-21 04:32
Severity ?
Summary
An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html | Release Notes, Vendor Advisory | |
| cve@mitre.org | https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215 | Exploit, Third Party Advisory | |
| cve@mitre.org | https://safebreach.com/blog | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://safebreach.com/blog | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| comodo | comodo_internet_security | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92B42BAB-EB62-49AB-9260-812DCFBAAC1A",
"versionEndExcluding": "12.1.0.6914",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en la biblioteca signmgr.dll versi\u00f3n 6.5.0.819 en Comodo Internet Security versiones hasta 12.0. Una vulnerabilidad de Precarga de DLL permite a un atacante implantar una DLL sin firmar llamada iLog.dll en un directorio de productos parcialmente desprotegido. Esta DLL es luego cargada en un servicio muy privilegio antes de que se cargue la l\u00f3gica de comprobaci\u00f3n de firma binaria, y puede omitir algunos de los mecanismos de autodefensa."
}
],
"id": "CVE-2019-18215",
"lastModified": "2024-11-21T04:32:50.987",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-11-18T20:15:11.223",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://safebreach.com/blog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://safebreach.com/blog"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-427"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-5120
Vulnerability from fkie_nvd - Published: 2012-08-26 03:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
"matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
"matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
"matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
"matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
"matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
"matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
"matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
"matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
"matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
"matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.174622.1216:*:*:*:*:*:*:*",
"matchCriteriaId": "BED60ABA-8677-4166-9EF3-4A3A589DA443",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.175888.1227:*:*:*:*:*:*:*",
"matchCriteriaId": "12C11343-2B73-4C14-AE2B-B29682F685FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.176757.1236:*:*:*:*:*:*:*",
"matchCriteriaId": "7F28989D-73BC-42B7-9831-74AB6A38ADDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.181415.1237:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE6A7A8-03E9-42E6-8DDD-F97BF1ED6E7A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file."
},
{
"lang": "es",
"value": "El componente Antivirus en Comodo Internet Security anterior a v5.4.189822.1355 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de ficheros .PST manipulados."
}
],
"id": "CVE-2011-5120",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-26T03:17:43.793",
"references": [
{
"source": "cve@mitre.org",
"url": "http://personalfirewall.comodo.com/release_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-5123
Vulnerability from fkie_nvd - Published: 2012-08-26 03:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C89FF93F-7748-445C-A847-4633A8320DCA",
"versionEndIncluding": "5.3.174622.1216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
"matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
"matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
"matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
"matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
"matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
"matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
"matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
"matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
"matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
"matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors."
},
{
"lang": "es",
"value": "El componente de antivirus en Comodo Internet Security anterior a v5.3.175888.1227 no comprueba si los certificados X.509 en archivos ejecutables firmados han sido revocados, lo cual tiene un impacto desconocido y vectores de ataque remotos tambi\u00e9n desconocidos."
}
],
"id": "CVE-2011-5123",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-26T03:17:43.917",
"references": [
{
"source": "cve@mitre.org",
"url": "http://personalfirewall.comodo.com/release_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-5123
Vulnerability from fkie_nvd - Published: 2012-08-26 03:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| comodo | comodo_internet_security | * | |
| comodo | comodo_internet_security | 3.0.14.276 | |
| comodo | comodo_internet_security | 3.0.15.277 | |
| comodo | comodo_internet_security | 3.0.16.295 | |
| comodo | comodo_internet_security | 3.0.17.304 | |
| comodo | comodo_internet_security | 3.0.18.309 | |
| comodo | comodo_internet_security | 3.0.19.318 | |
| comodo | comodo_internet_security | 3.0.20.320 | |
| comodo | comodo_internet_security | 3.0.22.349 | |
| comodo | comodo_internet_security | 3.0.23.364 | |
| comodo | comodo_internet_security | 3.0.24.368 | |
| comodo | comodo_internet_security | 3.0.25.378 | |
| comodo | comodo_internet_security | 3.5.53896.424 | |
| comodo | comodo_internet_security | 3.5.54375.427 | |
| comodo | comodo_internet_security | 3.5.55810.432 | |
| comodo | comodo_internet_security | 3.5.57173.439 | |
| comodo | comodo_internet_security | 3.8.64263.468 | |
| comodo | comodo_internet_security | 3.8.64739.471 | |
| comodo | comodo_internet_security | 3.8.65951.477 | |
| comodo | comodo_internet_security | 3.9.95478.509 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46541CB0-CF35-4D11-B1AD-3887C6ED7966",
"versionEndIncluding": "3.10.102363.531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
"matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
"matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
"matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
"matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file."
},
{
"lang": "es",
"value": "El componente Antivirus en Comodo Internet Security anterior a v3.11.108364.552 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de un fichero comprimido manipulado."
}
],
"id": "CVE-2009-5123",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-26T03:17:43.340",
"references": [
{
"source": "cve@mitre.org",
"url": "http://personalfirewall.comodo.com/release_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2010-5186
Vulnerability from fkie_nvd - Published: 2012-08-26 03:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 4.1.150349.920 allows remote attackers to cause a denial of service (application crash) via a crafted file.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6601C339-8C8F-4C81-A4C4-FF1C3E865897",
"versionEndIncluding": "4.0.141842.828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
"matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
"matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
"matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
"matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
"matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
"matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
"matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
"matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
"matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
"matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 4.1.150349.920 allows remote attackers to cause a denial of service (application crash) via a crafted file."
},
{
"lang": "es",
"value": "El componente Antivirus en Comodo Internet Security anterior a v4.1.150349.920 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero manipulado."
}
],
"id": "CVE-2010-5186",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-26T03:17:43.667",
"references": [
{
"source": "cve@mitre.org",
"url": "http://personalfirewall.comodo.com/release_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-5124
Vulnerability from fkie_nvd - Published: 2012-08-26 03:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (application crash) via a crafted packed file.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| comodo | comodo_internet_security | * | |
| comodo | comodo_internet_security | 3.0.14.276 | |
| comodo | comodo_internet_security | 3.0.15.277 | |
| comodo | comodo_internet_security | 3.0.16.295 | |
| comodo | comodo_internet_security | 3.0.17.304 | |
| comodo | comodo_internet_security | 3.0.18.309 | |
| comodo | comodo_internet_security | 3.0.19.318 | |
| comodo | comodo_internet_security | 3.0.20.320 | |
| comodo | comodo_internet_security | 3.0.22.349 | |
| comodo | comodo_internet_security | 3.0.23.364 | |
| comodo | comodo_internet_security | 3.0.24.368 | |
| comodo | comodo_internet_security | 3.0.25.378 | |
| comodo | comodo_internet_security | 3.5.53896.424 | |
| comodo | comodo_internet_security | 3.5.54375.427 | |
| comodo | comodo_internet_security | 3.5.55810.432 | |
| comodo | comodo_internet_security | 3.5.57173.439 | |
| comodo | comodo_internet_security | 3.8.64263.468 | |
| comodo | comodo_internet_security | 3.8.64739.471 | |
| comodo | comodo_internet_security | 3.8.65951.477 | |
| comodo | comodo_internet_security | 3.9.95478.509 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46541CB0-CF35-4D11-B1AD-3887C6ED7966",
"versionEndIncluding": "3.10.102363.531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
"matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
"matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
"matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
"matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (application crash) via a crafted packed file."
},
{
"lang": "es",
"value": "El componente Antivirus en Comodo Internet Security anterior a v3.11.108364.552 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero empaquetado manipulado."
}
],
"id": "CVE-2009-5124",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-26T03:17:43.403",
"references": [
{
"source": "cve@mitre.org",
"url": "http://personalfirewall.comodo.com/release_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-5122
Vulnerability from fkie_nvd - Published: 2012-08-26 03:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C89FF93F-7748-445C-A847-4633A8320DCA",
"versionEndIncluding": "5.3.174622.1216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
"matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
"matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
"matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
"matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
"matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
"matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
"matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
"matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
"matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
"matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file."
},
{
"lang": "es",
"value": "El componente Antivirus en Comodo Internet Security anterior a v5.3.175888.1227 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero comprimido manipulado."
}
],
"id": "CVE-2011-5122",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-26T03:17:43.870",
"references": [
{
"source": "cve@mitre.org",
"url": "http://personalfirewall.comodo.com/release_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-5121
Vulnerability from fkie_nvd - Published: 2012-08-26 03:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C89FF93F-7748-445C-A847-4633A8320DCA",
"versionEndIncluding": "5.3.174622.1216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
"matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
"matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
"matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
"matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
"matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
"matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
"matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
"matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
"matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
"matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors."
},
{
"lang": "es",
"value": "El componente Antivirus en Comodo Internet Security anterior a v5.3.175888.1227 no comprueba correctamente si no especificados certificados X.509 se revocan, la cual tiene un impacto desconocido y vectores de ataque remotos tambi\u00e9n desconocidos."
}
],
"id": "CVE-2011-5121",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-26T03:17:43.840",
"references": [
{
"source": "cve@mitre.org",
"url": "http://personalfirewall.comodo.com/release_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-5126
Vulnerability from fkie_nvd - Published: 2012-08-26 03:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 3.8.65951.477 allows remote attackers to cause a denial of service (application crash) via a crafted file.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| comodo | comodo_internet_security | * | |
| comodo | comodo_internet_security | 3.0.14.276 | |
| comodo | comodo_internet_security | 3.0.15.277 | |
| comodo | comodo_internet_security | 3.0.16.295 | |
| comodo | comodo_internet_security | 3.0.17.304 | |
| comodo | comodo_internet_security | 3.0.18.309 | |
| comodo | comodo_internet_security | 3.0.19.318 | |
| comodo | comodo_internet_security | 3.0.20.320 | |
| comodo | comodo_internet_security | 3.0.22.349 | |
| comodo | comodo_internet_security | 3.0.23.364 | |
| comodo | comodo_internet_security | 3.0.24.368 | |
| comodo | comodo_internet_security | 3.5.53896.424 | |
| comodo | comodo_internet_security | 3.5.54375.427 | |
| comodo | comodo_internet_security | 3.5.55810.432 | |
| comodo | comodo_internet_security | 3.5.57173.439 | |
| comodo | comodo_internet_security | 3.8.64263.468 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73D5F0B8-3509-4E1E-8904-BC91E18899E0",
"versionEndIncluding": "3.8.64739.471",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 3.8.65951.477 allows remote attackers to cause a denial of service (application crash) via a crafted file."
},
{
"lang": "es",
"value": "El componente Antivirus en Comodo Internet Security anterior a v3.8.65951.477 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero manipulado."
}
],
"id": "CVE-2009-5126",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-26T03:17:43.527",
"references": [
{
"source": "cve@mitre.org",
"url": "http://personalfirewall.comodo.com/release_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-5127
Vulnerability from fkie_nvd - Published: 2012-08-26 03:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| comodo | comodo_internet_security | * | |
| comodo | comodo_internet_security | 3.0.14.276 | |
| comodo | comodo_internet_security | 3.0.15.277 | |
| comodo | comodo_internet_security | 3.0.16.295 | |
| comodo | comodo_internet_security | 3.0.17.304 | |
| comodo | comodo_internet_security | 3.0.18.309 | |
| comodo | comodo_internet_security | 3.0.19.318 | |
| comodo | comodo_internet_security | 3.0.20.320 | |
| comodo | comodo_internet_security | 3.0.22.349 | |
| comodo | comodo_internet_security | 3.0.23.364 | |
| comodo | comodo_internet_security | 3.0.24.368 | |
| comodo | comodo_internet_security | 3.0.25.378 | |
| comodo | comodo_internet_security | 3.5.53896.424 | |
| comodo | comodo_internet_security | 3.5.54375.427 | |
| comodo | comodo_internet_security | 3.5.55810.432 | |
| comodo | comodo_internet_security | 3.5.57173.439 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28D408E5-7518-4411-BD02-B7D1889FE15C",
"versionEndIncluding": "3.8.64263.468",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
"matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file."
},
{
"lang": "es",
"value": "El componente Antivirus en Comodo Internet Security anterior a v3.8.64739.471 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero manipulado."
}
],
"id": "CVE-2009-5127",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-26T03:17:43.573",
"references": [
{
"source": "cve@mitre.org",
"url": "http://personalfirewall.comodo.com/release_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-5118
Vulnerability from fkie_nvd - Published: 2012-08-26 03:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple race conditions in Comodo Internet Security before 5.8.213334.2131 allow local users to bypass the Defense+ feature via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "06135EFC-EFB6-477D-BD31-CAA865D28FD0",
"versionEndIncluding": "5.8.211697.2124",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
"matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
"matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
"matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
"matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
"matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
"matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
"matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
"matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
"matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
"matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.174622.1216:*:*:*:*:*:*:*",
"matchCriteriaId": "BED60ABA-8677-4166-9EF3-4A3A589DA443",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.175888.1227:*:*:*:*:*:*:*",
"matchCriteriaId": "12C11343-2B73-4C14-AE2B-B29682F685FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.176757.1236:*:*:*:*:*:*:*",
"matchCriteriaId": "7F28989D-73BC-42B7-9831-74AB6A38ADDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.181415.1237:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE6A7A8-03E9-42E6-8DDD-F97BF1ED6E7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.4.189822.1355:*:*:*:*:*:*:*",
"matchCriteriaId": "2D56A473-CD6A-4CB7-B0DC-4FA257366538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.5.195786.1383:*:*:*:*:*:*:*",
"matchCriteriaId": "793C57D0-AD6B-4BA8-B147-5CFF6D571B4E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple race conditions in Comodo Internet Security before 5.8.213334.2131 allow local users to bypass the Defense+ feature via unspecified vectors."
},
{
"lang": "es",
"value": "M\u00faltiples condiciones de carrera (race conditions) en Comodo Internet Security anterior a 5.8.213334.2131 permite a usuarios locales saltarse la caracter\u00edstica Defense+ a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2011-5118",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-26T03:17:43.717",
"references": [
{
"source": "cve@mitre.org",
"url": "http://personalfirewall.comodo.com/release_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-5125
Vulnerability from fkie_nvd - Published: 2012-08-26 03:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
Comodo Internet Security before 3.9.95478.509 allows remote attackers to bypass malware detection in an RAR archive via an unspecified manipulation of the archive file format.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| comodo | comodo_internet_security | * | |
| comodo | comodo_internet_security | 3.0.14.276 | |
| comodo | comodo_internet_security | 3.0.15.277 | |
| comodo | comodo_internet_security | 3.0.16.295 | |
| comodo | comodo_internet_security | 3.0.17.304 | |
| comodo | comodo_internet_security | 3.0.18.309 | |
| comodo | comodo_internet_security | 3.0.19.318 | |
| comodo | comodo_internet_security | 3.0.20.320 | |
| comodo | comodo_internet_security | 3.0.22.349 | |
| comodo | comodo_internet_security | 3.0.23.364 | |
| comodo | comodo_internet_security | 3.0.24.368 | |
| comodo | comodo_internet_security | 3.5.53896.424 | |
| comodo | comodo_internet_security | 3.5.54375.427 | |
| comodo | comodo_internet_security | 3.5.55810.432 | |
| comodo | comodo_internet_security | 3.5.57173.439 | |
| comodo | comodo_internet_security | 3.8.64263.468 | |
| comodo | comodo_internet_security | 3.8.64739.471 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "322EF024-016D-4197-9303-451DA665EA98",
"versionEndIncluding": "3.8.65951.477",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
"matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Comodo Internet Security before 3.9.95478.509 allows remote attackers to bypass malware detection in an RAR archive via an unspecified manipulation of the archive file format."
},
{
"lang": "es",
"value": "Comodo Internet Security anterior a v3.9.95478.509 permite a atacantes remotos saltarse la detecci\u00f3n de c\u00f3digo malicioso en un fichero RAR a trav\u00e9s de una manipulaci\u00f3n no especificada o del formato del fichero."
}
],
"id": "CVE-2009-5125",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-26T03:17:43.480",
"references": [
{
"source": "cve@mitre.org",
"url": "http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html"
},
{
"source": "cve@mitre.org",
"url": "http://personalfirewall.comodo.com/release_notes.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/503018"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/34737"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://personalfirewall.comodo.com/release_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/503018"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34737"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-5119
Vulnerability from fkie_nvd - Published: 2012-08-26 03:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F353272-B716-43C5-A001-20A8257238F3",
"versionEndIncluding": "5.5.195786.1383",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
"matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
"matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
"matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
"matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
"matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
"matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
"matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
"matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
"matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
"matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.0.163652.1142:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD23EFF-F5F1-4F90-8E52-4FF457B19B0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.174622.1216:*:*:*:*:*:*:*",
"matchCriteriaId": "BED60ABA-8677-4166-9EF3-4A3A589DA443",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.175888.1227:*:*:*:*:*:*:*",
"matchCriteriaId": "12C11343-2B73-4C14-AE2B-B29682F685FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.176757.1236:*:*:*:*:*:*:*",
"matchCriteriaId": "7F28989D-73BC-42B7-9831-74AB6A38ADDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.3.181415.1237:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE6A7A8-03E9-42E6-8DDD-F97BF1ED6E7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:5.4.189822.1355:*:*:*:*:*:*:*",
"matchCriteriaId": "2D56A473-CD6A-4CB7-B0DC-4FA257366538",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors."
},
{
"lang": "es",
"value": "M\u00faltiples condiciones de carrera (race conditions) en Comodo Internet Security anterior a 5.8.211697.2124 permite a usuarios locales saltarse la caracter\u00edstica Defense+ a trav\u00e9s de vectores no especificados."
}
],
"id": "CVE-2011-5119",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-26T03:17:43.763",
"references": [
{
"source": "cve@mitre.org",
"url": "http://personalfirewall.comodo.com/release_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2010-5185
Vulnerability from fkie_nvd - Published: 2012-08-26 03:17 - Updated: 2025-04-11 00:51
Severity ?
Summary
The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2191F56F-A41E-42B8-86E6-1E16F6D8B96B",
"versionEndIncluding": "5.0.163652.1142",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.14.276:*:*:*:*:*:*:*",
"matchCriteriaId": "68D4B36C-D9C8-4127-B5F0-B0463C6CCEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.15.277:*:*:*:*:*:*:*",
"matchCriteriaId": "9D14032C-5F6F-46BF-9B75-90864B257F90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.16.295:*:*:*:*:*:*:*",
"matchCriteriaId": "6172BBD4-5E63-45AE-AE95-1D52ABDD3D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.17.304:*:*:*:*:*:*:*",
"matchCriteriaId": "789A3259-A177-4126-BABD-C97E358E5E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.18.309:*:*:*:*:*:*:*",
"matchCriteriaId": "3FEC54C9-8640-40AA-AC6B-EF91075E926E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.19.318:*:*:*:*:*:*:*",
"matchCriteriaId": "212EEC48-A672-4DC6-81A9-794F68934E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.20.320:*:*:*:*:*:*:*",
"matchCriteriaId": "203DDD77-5DA2-43A5-825F-419F906284B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.22.349:*:*:*:*:*:*:*",
"matchCriteriaId": "25C406CC-6734-467C-B776-A312B898BC2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.23.364:*:*:*:*:*:*:*",
"matchCriteriaId": "F5DE2BB5-B28D-4121-ABA3-2A38CEF69F92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.24.368:*:*:*:*:*:*:*",
"matchCriteriaId": "53E5C7F8-ACE5-44BD-9254-863E33878B10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.0.25.378:*:*:*:*:*:*:*",
"matchCriteriaId": "9EACED07-60E9-4F8F-A601-15297345B4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.53896.424:*:*:*:*:*:*:*",
"matchCriteriaId": "7573FD23-52AF-4528-BF6D-3186180EA2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.54375.427:*:*:*:*:*:*:*",
"matchCriteriaId": "824CC29D-320B-417F-B16B-C5512A5A67F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.55810.432:*:*:*:*:*:*:*",
"matchCriteriaId": "0C26BC64-02E4-454A-AF54-FB1B2237801B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.5.57173.439:*:*:*:*:*:*:*",
"matchCriteriaId": "22B9453D-EC9F-4C82-BE82-455CE1560647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64263.468:*:*:*:*:*:*:*",
"matchCriteriaId": "D0CBAC49-96FE-4A4C-8FAB-E08487E172DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.64739.471:*:*:*:*:*:*:*",
"matchCriteriaId": "3803F2CB-04D7-4B1D-8759-38FCA700F33E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.8.65951.477:*:*:*:*:*:*:*",
"matchCriteriaId": "492C3D78-183F-4FAD-8D1D-1154349A8B94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.9.95478.509:*:*:*:*:*:*:*",
"matchCriteriaId": "5BEA510A-4B55-4CF3-BF82-9A877E483F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.10.102363.531:*:*:*:*:*:*:*",
"matchCriteriaId": "8772803D-66DC-4983-9798-C8105A9A0E38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.11.108364.552:*:*:*:*:*:*:*",
"matchCriteriaId": "DE9CFEA2-D401-4F01-A6F8-88884A8D3275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.12.111745.560:*:*:*:*:*:*:*",
"matchCriteriaId": "75696215-6E01-4658-9D37-BE9162EA6A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.121240.574:*:*:*:*:*:*:*",
"matchCriteriaId": "353D049F-AA13-48F1-956A-C5E05492DB89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.13.125662.579:*:*:*:*:*:*:*",
"matchCriteriaId": "AF99977B-A91F-4591-B279-26E764076D57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:3.14.130099.587:*:*:*:*:*:*:*",
"matchCriteriaId": "2439A269-9DB4-46AA-B719-6513F395FA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.138377.779:*:*:*:*:*:*:*",
"matchCriteriaId": "E548AB65-3CF2-4A87-8432-B22B764C2D38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.0.141842.828:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1E7B7A-6B1C-4C17-9583-AC7F5E56A4B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:comodo:comodo_internet_security:4.1.150349.920:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB8865D-6686-4512-A576-0171D79D0063",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors."
},
{
"lang": "es",
"value": "El componente Antivirus en Comodo Internet Security anterior a v5.3.174622.1216 no comprueba adecuadamente si los certificados X.509 de ficheros ejecutables han sido revocados, lo cual tiene un impacto desconocido y vectores de ataque tambi\u00e9n desconocidos."
}
],
"id": "CVE-2010-5185",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-26T03:17:43.620",
"references": [
{
"source": "cve@mitre.org",
"url": "http://personalfirewall.comodo.com/release_notes.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2019-18215 (GCVE-0-2019-18215)
Vulnerability from cvelistv5 – Published: 2019-11-18 20:00 – Updated: 2024-08-05 01:47
VLAI?
Summary
An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T01:47:14.105Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://safebreach.com/blog"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-11-18T20:00:48",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://safebreach.com/blog"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-18215",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://safebreach.com/blog",
"refsource": "MISC",
"url": "https://safebreach.com/blog"
},
{
"name": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215",
"refsource": "MISC",
"url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215"
},
{
"name": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html",
"refsource": "MISC",
"url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-18215",
"datePublished": "2019-11-18T20:00:48",
"dateReserved": "2019-10-20T00:00:00",
"dateUpdated": "2024-08-05T01:47:14.105Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-5120 (GCVE-0-2011-5120)
Vulnerability from cvelistv5 – Published: 2012-08-26 01:00 – Updated: 2024-09-16 23:45
VLAI?
Summary
The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:23:39.988Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-26T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-5120",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://personalfirewall.comodo.com/release_notes.html",
"refsource": "CONFIRM",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-5120",
"datePublished": "2012-08-26T01:00:00Z",
"dateReserved": "2012-08-25T00:00:00Z",
"dateUpdated": "2024-09-16T23:45:57.418Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-5123 (GCVE-0-2009-5123)
Vulnerability from cvelistv5 – Published: 2012-08-26 01:00 – Updated: 2024-09-16 16:32
VLAI?
Summary
The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:32:23.467Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-26T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-5123",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://personalfirewall.comodo.com/release_notes.html",
"refsource": "CONFIRM",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-5123",
"datePublished": "2012-08-26T01:00:00Z",
"dateReserved": "2012-08-25T00:00:00Z",
"dateUpdated": "2024-09-16T16:32:45.660Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-5185 (GCVE-0-2010-5185)
Vulnerability from cvelistv5 – Published: 2012-08-26 01:00 – Updated: 2024-09-16 16:53
VLAI?
Summary
The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:09:39.297Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-26T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-5185",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://personalfirewall.comodo.com/release_notes.html",
"refsource": "CONFIRM",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-5185",
"datePublished": "2012-08-26T01:00:00Z",
"dateReserved": "2012-08-25T00:00:00Z",
"dateUpdated": "2024-09-16T16:53:13.278Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-5119 (GCVE-0-2011-5119)
Vulnerability from cvelistv5 – Published: 2012-08-26 01:00 – Updated: 2024-09-16 22:45
VLAI?
Summary
Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:23:40.203Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-26T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-5119",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://personalfirewall.comodo.com/release_notes.html",
"refsource": "CONFIRM",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-5119",
"datePublished": "2012-08-26T01:00:00Z",
"dateReserved": "2012-08-25T00:00:00Z",
"dateUpdated": "2024-09-16T22:45:12.173Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-5122 (GCVE-0-2011-5122)
Vulnerability from cvelistv5 – Published: 2012-08-26 01:00 – Updated: 2024-09-17 00:46
VLAI?
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:23:40.181Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-26T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-5122",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://personalfirewall.comodo.com/release_notes.html",
"refsource": "CONFIRM",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-5122",
"datePublished": "2012-08-26T01:00:00Z",
"dateReserved": "2012-08-25T00:00:00Z",
"dateUpdated": "2024-09-17T00:46:17.731Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-5121 (GCVE-0-2011-5121)
Vulnerability from cvelistv5 – Published: 2012-08-26 01:00 – Updated: 2024-09-17 01:36
VLAI?
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:23:40.222Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-26T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-5121",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://personalfirewall.comodo.com/release_notes.html",
"refsource": "CONFIRM",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-5121",
"datePublished": "2012-08-26T01:00:00Z",
"dateReserved": "2012-08-25T00:00:00Z",
"dateUpdated": "2024-09-17T01:36:06.256Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-5127 (GCVE-0-2009-5127)
Vulnerability from cvelistv5 – Published: 2012-08-26 01:00 – Updated: 2024-09-17 03:38
VLAI?
Summary
The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:32:22.247Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-26T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-5127",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://personalfirewall.comodo.com/release_notes.html",
"refsource": "CONFIRM",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-5127",
"datePublished": "2012-08-26T01:00:00Z",
"dateReserved": "2012-08-25T00:00:00Z",
"dateUpdated": "2024-09-17T03:38:21.459Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-18215 (GCVE-0-2019-18215)
Vulnerability from nvd – Published: 2019-11-18 20:00 – Updated: 2024-08-05 01:47
VLAI?
Summary
An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T01:47:14.105Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://safebreach.com/blog"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-11-18T20:00:48",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://safebreach.com/blog"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-18215",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in signmgr.dll 6.5.0.819 in Comodo Internet Security through 12.0. A DLL Preloading vulnerability allows an attacker to implant an unsigned DLL named iLog.dll in a partially unprotected product directory. This DLL is then loaded into a high-privileged service before the binary signature validation logic is loaded, and might bypass some of the self-defense mechanisms."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://safebreach.com/blog",
"refsource": "MISC",
"url": "https://safebreach.com/blog"
},
{
"name": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215",
"refsource": "MISC",
"url": "https://safebreach.com/Post/Comodo-Internet-Security-DLL-Preloading-and-Potential-Abuses-CVE-2019-18215"
},
{
"name": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html",
"refsource": "MISC",
"url": "https://forums.comodo.com/news-announcements-feedback-cis/comodo-internet-security-2019-v12106914-released-t124993.0.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-18215",
"datePublished": "2019-11-18T20:00:48",
"dateReserved": "2019-10-20T00:00:00",
"dateUpdated": "2024-08-05T01:47:14.105Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-5120 (GCVE-0-2011-5120)
Vulnerability from nvd – Published: 2012-08-26 01:00 – Updated: 2024-09-16 23:45
VLAI?
Summary
The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:23:39.988Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-26T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-5120",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Antivirus component in Comodo Internet Security before 5.4.189822.1355 allows remote attackers to cause a denial of service (application crash) via a crafted .PST file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://personalfirewall.comodo.com/release_notes.html",
"refsource": "CONFIRM",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-5120",
"datePublished": "2012-08-26T01:00:00Z",
"dateReserved": "2012-08-25T00:00:00Z",
"dateUpdated": "2024-09-16T23:45:57.418Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-5123 (GCVE-0-2009-5123)
Vulnerability from nvd – Published: 2012-08-26 01:00 – Updated: 2024-09-16 16:32
VLAI?
Summary
The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:32:23.467Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-26T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-5123",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Antivirus component in Comodo Internet Security before 3.11.108364.552 allows remote attackers to cause a denial of service (memory consumption) via a crafted compressed file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://personalfirewall.comodo.com/release_notes.html",
"refsource": "CONFIRM",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-5123",
"datePublished": "2012-08-26T01:00:00Z",
"dateReserved": "2012-08-25T00:00:00Z",
"dateUpdated": "2024-09-16T16:32:45.660Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2010-5185 (GCVE-0-2010-5185)
Vulnerability from nvd – Published: 2012-08-26 01:00 – Updated: 2024-09-16 16:53
VLAI?
Summary
The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:09:39.297Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-26T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-5185",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Antivirus component in Comodo Internet Security before 5.3.174622.1216 does not check whether X.509 certificates in signed executable files have been revoked, which has unknown impact and remote attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://personalfirewall.comodo.com/release_notes.html",
"refsource": "CONFIRM",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-5185",
"datePublished": "2012-08-26T01:00:00Z",
"dateReserved": "2012-08-25T00:00:00Z",
"dateUpdated": "2024-09-16T16:53:13.278Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-5119 (GCVE-0-2011-5119)
Vulnerability from nvd – Published: 2012-08-26 01:00 – Updated: 2024-09-16 22:45
VLAI?
Summary
Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:23:40.203Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-26T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-5119",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple race conditions in Comodo Internet Security before 5.8.211697.2124 allow local users to bypass the Defense+ feature via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://personalfirewall.comodo.com/release_notes.html",
"refsource": "CONFIRM",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-5119",
"datePublished": "2012-08-26T01:00:00Z",
"dateReserved": "2012-08-25T00:00:00Z",
"dateUpdated": "2024-09-16T22:45:12.173Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-5122 (GCVE-0-2011-5122)
Vulnerability from nvd – Published: 2012-08-26 01:00 – Updated: 2024-09-17 00:46
VLAI?
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:23:40.181Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-26T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-5122",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 allows remote attackers to cause a denial of service (application crash) via a crafted compressed file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://personalfirewall.comodo.com/release_notes.html",
"refsource": "CONFIRM",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-5122",
"datePublished": "2012-08-26T01:00:00Z",
"dateReserved": "2012-08-25T00:00:00Z",
"dateUpdated": "2024-09-17T00:46:17.731Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-5121 (GCVE-0-2011-5121)
Vulnerability from nvd – Published: 2012-08-26 01:00 – Updated: 2024-09-17 01:36
VLAI?
Summary
The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:23:40.222Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-26T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-5121",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Antivirus component in Comodo Internet Security before 5.3.175888.1227 does not properly check whether unspecified X.509 certificates are revoked, which has unknown impact and remote attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://personalfirewall.comodo.com/release_notes.html",
"refsource": "CONFIRM",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-5121",
"datePublished": "2012-08-26T01:00:00Z",
"dateReserved": "2012-08-25T00:00:00Z",
"dateUpdated": "2024-09-17T01:36:06.256Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-5127 (GCVE-0-2009-5127)
Vulnerability from nvd – Published: 2012-08-26 01:00 – Updated: 2024-09-17 03:38
VLAI?
Summary
The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:32:22.247Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2012-08-26T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-5127",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The Antivirus component in Comodo Internet Security before 3.8.64739.471 allows remote attackers to cause a denial of service (application crash) via a crafted file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://personalfirewall.comodo.com/release_notes.html",
"refsource": "CONFIRM",
"url": "http://personalfirewall.comodo.com/release_notes.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-5127",
"datePublished": "2012-08-26T01:00:00Z",
"dateReserved": "2012-08-25T00:00:00Z",
"dateUpdated": "2024-09-17T03:38:21.459Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}