Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
75 vulnerabilities found for total_security by k7computing
FKIE_CVE-2018-11246
Vulnerability from fkie_nvd - Published: 2021-01-11 16:15 - Updated: 2024-11-21 03:42
Severity ?
Summary
K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| k7computing | antivrius | * | |
| k7computing | enterprise_security | * | |
| k7computing | total_security | * | |
| k7computing | ultimate_security | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*",
"matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511",
"versionEndExcluding": "14.2.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak."
},
{
"lang": "es",
"value": "K7TSMngr.exe en K7Computing K7AntiVirus Premium versi\u00f3n 15.1.0.53, presenta una fuga de la memoria"
}
],
"id": "CVE-2018-11246",
"lastModified": "2024-11-21T03:42:59.277",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-11T16:15:13.103",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.k7computing.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://www.k7computing.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-9333
Vulnerability from fkie_nvd - Published: 2021-01-11 16:15 - Updated: 2024-11-21 04:15
Severity ?
Summary
K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| k7computing | antivrius | * | |
| k7computing | enterprise_security | * | |
| k7computing | total_security | * | |
| k7computing | ultimate_security | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*",
"matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511",
"versionEndExcluding": "14.2.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe."
},
{
"lang": "es",
"value": "K7Computing Pvt Ltd K7AntiVirus Premium versi\u00f3n 15.1.0.53, est\u00e1 afectado por: un Desbordamiento de B\u00fafer.\u0026#xa0;El impacto es: ejecutar c\u00f3digo arbitrario (local).\u0026#xa0;El componente es: el archivo K7TSMngr.exe"
}
],
"id": "CVE-2018-9333",
"lastModified": "2024-11-21T04:15:21.103",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-11T16:15:13.587",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://k7antivirus.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://k7computing.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://k7antivirus.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://k7computing.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
},
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-8044
Vulnerability from fkie_nvd - Published: 2021-01-11 16:15 - Updated: 2024-11-21 04:13
Severity ?
Summary
K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| k7computing | antivrius | * | |
| k7computing | enterprise_security | * | |
| k7computing | total_security | * | |
| k7computing | ultimate_security | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*",
"matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511",
"versionEndExcluding": "14.2.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys."
},
{
"lang": "es",
"value": "K7Computing Pvt Ltd K7Antivirus Premium versi\u00f3n 15.1.0.53, est\u00e1 afectado por: un Control de acceso incorrecto.\u0026#xa0;El impacto es: una Ejecuci\u00f3n de Procesos Locales (local).\u0026#xa0;El componente es: la biblioteca K7Sentry.sys"
}
],
"id": "CVE-2018-8044",
"lastModified": "2024-11-21T04:13:10.273",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-11T16:15:13.180",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://k7antivirus.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://k7computing.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://k7antivirus.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://k7computing.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
},
{
"lang": "en",
"value": "CWE-863"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-8724
Vulnerability from fkie_nvd - Published: 2021-01-11 16:15 - Updated: 2024-11-21 04:14
Severity ?
Summary
K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local). The component is: K7TSMngr.exe.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| k7computing | antivrius | * | |
| k7computing | enterprise_security | * | |
| k7computing | total_security | * | |
| k7computing | ultimate_security | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*",
"matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511",
"versionEndExcluding": "14.2.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local). The component is: K7TSMngr.exe."
},
{
"lang": "es",
"value": "K7Computing Pvt Ltd K7AntiVirus Premium versi\u00f3n 15.1.0.53, est\u00e1 afectado por: un Control de acceso incorrecto.\u0026#xa0;El impacto es: alcanzar privilegios (local).\u0026#xa0;El componente es: el archivo K7TSMngr.exe"
}
],
"id": "CVE-2018-8724",
"lastModified": "2024-11-21T04:14:12.770",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-11T16:15:13.257",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://k7antivirus.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://k7computing.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://k7antivirus.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://k7computing.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
},
{
"lang": "en",
"value": "CWE-863"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-8726
Vulnerability from fkie_nvd - Published: 2021-01-11 16:15 - Updated: 2024-11-21 04:14
Severity ?
Summary
K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| k7computing | antivrius | * | |
| k7computing | enterprise_security | * | |
| k7computing | total_security | * | |
| k7computing | ultimate_security | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*",
"matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511",
"versionEndExcluding": "14.2.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe."
},
{
"lang": "es",
"value": "K7Computing Pvt Ltd K7Antivirus Premium versi\u00f3n 15.1.0.53, est\u00e1 afectado por: Desbordamiento de B\u00fafer.\u0026#xa0;El impacto es: ejecutar c\u00f3digo arbitrario (local).\u0026#xa0;El componente es: Archivo K7TSMngr.exe"
}
],
"id": "CVE-2018-8726",
"lastModified": "2024-11-21T04:14:13.083",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-11T16:15:13.413",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://k7antivirus.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://k7computing.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://k7antivirus.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://k7computing.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-9332
Vulnerability from fkie_nvd - Published: 2021-01-11 16:15 - Updated: 2024-11-21 04:15
Severity ?
Summary
K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local).
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| k7computing | antivrius | * | |
| k7computing | enterprise_security | * | |
| k7computing | total_security | * | |
| k7computing | ultimate_security | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*",
"matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511",
"versionEndExcluding": "14.2.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local)."
},
{
"lang": "es",
"value": "K7Computing Pvt Ltd K7AntiVirus Premium versi\u00f3n 15.01.00.53, est\u00e1 afectado por: un Control de Acceso Incorrecto.\u0026#xa0;El impacto es: alcanzar privilegios (local)"
}
],
"id": "CVE-2018-9332",
"lastModified": "2024-11-21T04:15:20.930",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-11T16:15:13.493",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://k7antivirus.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://k7computing.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://k7antivirus.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://k7computing.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-8725
Vulnerability from fkie_nvd - Published: 2021-01-11 16:15 - Updated: 2024-11-21 04:14
Severity ?
Summary
K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| k7computing | antivrius | * | |
| k7computing | enterprise_security | * | |
| k7computing | total_security | * | |
| k7computing | ultimate_security | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*",
"matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511",
"versionEndExcluding": "14.2.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe."
},
{
"lang": "es",
"value": "K7Computing Pvt Ltd K7AntiVirus Premium versi\u00f3n 15.01.00.53, est\u00e1 afectado por: un Desbordamiento del B\u00fafer.\u0026#xa0;El impacto es: ejecutar c\u00f3digo arbitrario (local).\u0026#xa0;El componente es: el archivo K7TSMngr.exe"
}
],
"id": "CVE-2018-8725",
"lastModified": "2024-11-21T04:14:12.920",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-11T16:15:13.337",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://k7antivirus.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://k7computing.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://k7antivirus.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://k7computing.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-11007
Vulnerability from fkie_nvd - Published: 2021-01-11 16:15 - Updated: 2024-11-21 03:42
Severity ?
Summary
A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
| cve@mitre.org | https://www.k7computing.com | Product, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.k7computing.com | Product, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| k7computing | antivrius | * | |
| k7computing | enterprise_security | * | |
| k7computing | total_security | * | |
| k7computing | ultimate_security | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*",
"matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511",
"versionEndExcluding": "14.2.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema de p\u00e9rdida de memoria en K7Computing K7AntiVirus Premium versi\u00f3n 15.01.00.53"
}
],
"id": "CVE-2018-11007",
"lastModified": "2024-11-21T03:42:28.980",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-11T16:15:12.820",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.k7computing.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.k7computing.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-11009
Vulnerability from fkie_nvd - Published: 2021-01-11 16:15 - Updated: 2024-11-21 03:42
Severity ?
Summary
A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
| cve@mitre.org | https://www.k7computing.com | Product, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.k7computing.com | Product, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| k7computing | antivrius | * | |
| k7computing | enterprise_security | * | |
| k7computing | total_security | * | |
| k7computing | ultimate_security | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*",
"matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511",
"versionEndExcluding": "14.2.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema de desbordamiento del b\u00fafer en K7Computing K7AntiVirus Premium versi\u00f3n 15.01.00.53"
}
],
"id": "CVE-2018-11009",
"lastModified": "2024-11-21T03:42:29.280",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-11T16:15:12.930",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.k7computing.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.k7computing.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-11010
Vulnerability from fkie_nvd - Published: 2021-01-11 16:15 - Updated: 2024-11-21 03:42
Severity ?
Summary
A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
| cve@mitre.org | https://www.k7computing.com | Product, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.k7computing.com | Product, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| k7computing | antivrius | * | |
| k7computing | enterprise_security | * | |
| k7computing | total_security | * | |
| k7computing | ultimate_security | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*",
"matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511",
"versionEndExcluding": "14.2.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema de desbordamiento del b\u00fafer en K7Computing K7AntiVirus Premium versi\u00f3n 15.01.00.53"
}
],
"id": "CVE-2018-11010",
"lastModified": "2024-11-21T03:42:29.437",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-11T16:15:12.993",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.k7computing.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.k7computing.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-11005
Vulnerability from fkie_nvd - Published: 2021-01-11 16:15 - Updated: 2024-11-21 03:42
Severity ?
Summary
A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
| cve@mitre.org | https://www.k7computing.com | Product, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.k7computing.com | Product, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| k7computing | antivrius | * | |
| k7computing | enterprise_security | * | |
| k7computing | total_security | * | |
| k7computing | ultimate_security | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*",
"matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511",
"versionEndExcluding": "14.2.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema de p\u00e9rdida de memoria en K7Computing K7AntiVirus Premium versi\u00f3n 15.01.00.53"
}
],
"id": "CVE-2018-11005",
"lastModified": "2024-11-21T03:42:28.677",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-11T16:15:12.727",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.k7computing.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.k7computing.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-11006
Vulnerability from fkie_nvd - Published: 2021-01-11 16:15 - Updated: 2024-11-21 03:42
Severity ?
Summary
An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
| cve@mitre.org | https://www.k7computing.com | Product, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.k7computing.com | Product, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| k7computing | antivrius | * | |
| k7computing | enterprise_security | * | |
| k7computing | total_security | * | |
| k7computing | ultimate_security | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*",
"matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511",
"versionEndExcluding": "14.2.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema de Control de Acceso Incorrecto en K7Computing K7AntiVirus Premium versi\u00f3n 15.01.00.53"
}
],
"id": "CVE-2018-11006",
"lastModified": "2024-11-21T03:42:28.833",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.8,
"confidentialityImpact": "NONE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 9.2,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-11T16:15:12.773",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.k7computing.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.k7computing.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2018-11008
Vulnerability from fkie_nvd - Published: 2021-01-11 16:15 - Updated: 2024-11-21 03:42
Severity ?
Summary
An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
| cve@mitre.org | https://www.k7computing.com | Product, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.k7computing.com | Product, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| k7computing | antivrius | * | |
| k7computing | enterprise_security | * | |
| k7computing | total_security | * | |
| k7computing | ultimate_security | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*",
"matchCriteriaId": "721DCDB7-8342-44E2-AB03-E7F5E62E5EA9",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6329F23D-B675-4C2E-95BA-FDF600653511",
"versionEndExcluding": "14.2.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D20E597F-D94E-4C17-8926-FF75D8AF5DFB",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73A7AB9E-C6FF-4D74-A65B-F782E117FD76",
"versionEndExcluding": "16.0.0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema de Control de Acceso incorrecto en K7Computing K7AntiVirus Premium versi\u00f3n 15.01.00.53"
}
],
"id": "CVE-2018-11008",
"lastModified": "2024-11-21T03:42:29.133",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-01-11T16:15:12.883",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.k7computing.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.k7computing.com"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2018-11246 (GCVE-0-2018-11246)
Vulnerability from cvelistv5 – Published: 2021-01-11 15:43 – Updated: 2024-08-05 08:01
VLAI?
Summary
K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T08:01:52.848Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:43:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11246",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.k7computing.com",
"refsource": "MISC",
"url": "https://www.k7computing.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-11246",
"datePublished": "2021-01-11T15:43:01.000Z",
"dateReserved": "2018-05-18T00:00:00.000Z",
"dateUpdated": "2024-08-05T08:01:52.848Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-11010 (GCVE-0-2018-11010)
Vulnerability from cvelistv5 – Published: 2021-01-11 15:42 – Updated: 2024-08-05 07:54
VLAI?
Summary
A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:54:36.467Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:42:28.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11010",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.k7computing.com",
"refsource": "MISC",
"url": "https://www.k7computing.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-11010",
"datePublished": "2021-01-11T15:42:28.000Z",
"dateReserved": "2018-05-11T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:54:36.467Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-11005 (GCVE-0-2018-11005)
Vulnerability from cvelistv5 – Published: 2021-01-11 15:41 – Updated: 2024-08-05 07:54
VLAI?
Summary
A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:54:36.477Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:41:32.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11005",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.k7computing.com",
"refsource": "MISC",
"url": "https://www.k7computing.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-11005",
"datePublished": "2021-01-11T15:41:32.000Z",
"dateReserved": "2018-05-11T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:54:36.477Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-11007 (GCVE-0-2018-11007)
Vulnerability from cvelistv5 – Published: 2021-01-11 15:41 – Updated: 2024-08-05 07:54
VLAI?
Summary
A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:54:36.073Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:41:06.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11007",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.k7computing.com",
"refsource": "MISC",
"url": "https://www.k7computing.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-11007",
"datePublished": "2021-01-11T15:41:06.000Z",
"dateReserved": "2018-05-11T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:54:36.073Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-11009 (GCVE-0-2018-11009)
Vulnerability from cvelistv5 – Published: 2021-01-11 15:40 – Updated: 2024-08-05 07:54
VLAI?
Summary
A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:54:36.288Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:40:34.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11009",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.k7computing.com",
"refsource": "MISC",
"url": "https://www.k7computing.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-11009",
"datePublished": "2021-01-11T15:40:34.000Z",
"dateReserved": "2018-05-11T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:54:36.288Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-11008 (GCVE-0-2018-11008)
Vulnerability from cvelistv5 – Published: 2021-01-11 15:39 – Updated: 2024-08-05 07:54
VLAI?
Summary
An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:54:36.626Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:39:26.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11008",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.k7computing.com",
"refsource": "MISC",
"url": "https://www.k7computing.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-11008",
"datePublished": "2021-01-11T15:39:26.000Z",
"dateReserved": "2018-05-11T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:54:36.626Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-11006 (GCVE-0-2018-11006)
Vulnerability from cvelistv5 – Published: 2021-01-11 15:38 – Updated: 2024-08-05 07:54
VLAI?
Summary
An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:54:36.226Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:38:25.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11006",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.k7computing.com",
"refsource": "MISC",
"url": "https://www.k7computing.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-11006",
"datePublished": "2021-01-11T15:38:25.000Z",
"dateReserved": "2018-05-11T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:54:36.226Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-8044 (GCVE-0-2018-8044)
Vulnerability from cvelistv5 – Published: 2021-01-11 15:36 – Updated: 2024-08-05 06:46
VLAI?
Summary
K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:46:11.563Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://k7computing.com"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://k7antivirus.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:36:36.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://k7computing.com"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://k7antivirus.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-8044",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://k7computing.com",
"refsource": "MISC",
"url": "http://k7computing.com"
},
{
"name": "http://k7antivirus.com",
"refsource": "MISC",
"url": "http://k7antivirus.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-8044",
"datePublished": "2021-01-11T15:36:36.000Z",
"dateReserved": "2018-03-10T00:00:00.000Z",
"dateUpdated": "2024-08-05T06:46:11.563Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-8726 (GCVE-0-2018-8726)
Vulnerability from cvelistv5 – Published: 2021-01-11 15:35 – Updated: 2024-08-05 07:02
VLAI?
Summary
K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:02:26.024Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://k7computing.com"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://k7antivirus.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:35:52.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://k7computing.com"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://k7antivirus.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-8726",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://k7computing.com",
"refsource": "MISC",
"url": "http://k7computing.com"
},
{
"name": "http://k7antivirus.com",
"refsource": "MISC",
"url": "http://k7antivirus.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-8726",
"datePublished": "2021-01-11T15:35:52.000Z",
"dateReserved": "2018-03-15T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:02:26.024Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-11246 (GCVE-0-2018-11246)
Vulnerability from nvd – Published: 2021-01-11 15:43 – Updated: 2024-08-05 08:01
VLAI?
Summary
K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T08:01:52.848Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:43:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11246",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.k7computing.com",
"refsource": "MISC",
"url": "https://www.k7computing.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-11246",
"datePublished": "2021-01-11T15:43:01.000Z",
"dateReserved": "2018-05-18T00:00:00.000Z",
"dateUpdated": "2024-08-05T08:01:52.848Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-11010 (GCVE-0-2018-11010)
Vulnerability from nvd – Published: 2021-01-11 15:42 – Updated: 2024-08-05 07:54
VLAI?
Summary
A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:54:36.467Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:42:28.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11010",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.k7computing.com",
"refsource": "MISC",
"url": "https://www.k7computing.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-11010",
"datePublished": "2021-01-11T15:42:28.000Z",
"dateReserved": "2018-05-11T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:54:36.467Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-11005 (GCVE-0-2018-11005)
Vulnerability from nvd – Published: 2021-01-11 15:41 – Updated: 2024-08-05 07:54
VLAI?
Summary
A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:54:36.477Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:41:32.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11005",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.k7computing.com",
"refsource": "MISC",
"url": "https://www.k7computing.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-11005",
"datePublished": "2021-01-11T15:41:32.000Z",
"dateReserved": "2018-05-11T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:54:36.477Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-11007 (GCVE-0-2018-11007)
Vulnerability from nvd – Published: 2021-01-11 15:41 – Updated: 2024-08-05 07:54
VLAI?
Summary
A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:54:36.073Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:41:06.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11007",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.k7computing.com",
"refsource": "MISC",
"url": "https://www.k7computing.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-11007",
"datePublished": "2021-01-11T15:41:06.000Z",
"dateReserved": "2018-05-11T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:54:36.073Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-11009 (GCVE-0-2018-11009)
Vulnerability from nvd – Published: 2021-01-11 15:40 – Updated: 2024-08-05 07:54
VLAI?
Summary
A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:54:36.288Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:40:34.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11009",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.k7computing.com",
"refsource": "MISC",
"url": "https://www.k7computing.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-11009",
"datePublished": "2021-01-11T15:40:34.000Z",
"dateReserved": "2018-05-11T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:54:36.288Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-11008 (GCVE-0-2018-11008)
Vulnerability from nvd – Published: 2021-01-11 15:39 – Updated: 2024-08-05 07:54
VLAI?
Summary
An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:54:36.626Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:39:26.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11008",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.k7computing.com",
"refsource": "MISC",
"url": "https://www.k7computing.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-11008",
"datePublished": "2021-01-11T15:39:26.000Z",
"dateReserved": "2018-05-11T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:54:36.626Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-11006 (GCVE-0-2018-11006)
Vulnerability from nvd – Published: 2021-01-11 15:38 – Updated: 2024-08-05 07:54
VLAI?
Summary
An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:54:36.226Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:38:25.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.k7computing.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-11006",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.k7computing.com",
"refsource": "MISC",
"url": "https://www.k7computing.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-11006",
"datePublished": "2021-01-11T15:38:25.000Z",
"dateReserved": "2018-05-11T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:54:36.226Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2018-8044 (GCVE-0-2018-8044)
Vulnerability from nvd – Published: 2021-01-11 15:36 – Updated: 2024-08-05 06:46
VLAI?
Summary
K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T06:46:11.563Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://k7computing.com"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://k7antivirus.com"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-01-11T15:36:36.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://k7computing.com"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://k7antivirus.com"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-8044",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://k7computing.com",
"refsource": "MISC",
"url": "http://k7computing.com"
},
{
"name": "http://k7antivirus.com",
"refsource": "MISC",
"url": "http://k7antivirus.com"
},
{
"name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021",
"refsource": "CONFIRM",
"url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-8044",
"datePublished": "2021-01-11T15:36:36.000Z",
"dateReserved": "2018-03-10T00:00:00.000Z",
"dateUpdated": "2024-08-05T06:46:11.563Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}