Vulnerabilities > Pandasecurity > Panda Global Protection
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-05-23 | CVE-2019-12042 | Incorrect Permission Assignment for Critical Resource vulnerability in Pandasecurity products Insecure permissions of the section object Global\PandaDevicesAgentSharedMemory and the event Global\PandaDevicesAgentSharedMemoryChange in Panda products before 18.07.03 allow attackers to queue an event (as an encrypted JSON string) to the system service AgentSvc.exe, which leads to privilege escalation when the CmdLineExecute event is queued. | 10.0 |
2018-03-12 | CVE-2018-6322 | Unspecified vulnerability in Pandasecurity Panda Global Protection 17.0.1 Panda Global Protection 17.0.1 allows local users to gain privileges or cause a denial of service by impersonating all the pipes through a use of \.\pipe\PSANMSrvcPpal -- an "insecurely created named pipe." Ensures full access to Everyone users group. | 4.6 |
2018-03-12 | CVE-2018-6321 | Unquoted Search Path or Element vulnerability in Pandasecurity Panda Global Protection 17.0.1 Unquoted Windows search path vulnerability in the panda_url_filtering service in Panda Global Protection 17.0.1 allows local users to gain privileges via a malicious artefact. | 4.6 |
2017-12-14 | CVE-2017-17684 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Pandasecurity Panda Global Protection 17.0.1 Panda Global Protection 17.0.1 allows a system crash via a 0xb3702c04 \\.\PSMEMDriver DeviceIoControl request. | 7.8 |
2017-12-14 | CVE-2017-17683 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Pandasecurity Panda Global Protection 17.0.1 Panda Global Protection 17.0.1 allows a system crash via a 0xb3702c44 \\.\PSMEMDriver DeviceIoControl request. | 7.8 |
2009-12-07 | CVE-2009-4215 | Permissions, Privileges, and Access Controls vulnerability in Pandasecurity products Panda Global Protection 2010, Internet Security 2010, and Antivirus Pro 2010 use weak permissions (Everyone: Full Control) for the product files, which allows local users to gain privileges by replacing executables with Trojan horse programs. | 7.2 |