The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Panda AV

Antivirus: privilege escalation via Microsoft Application Verifier
An attacker can bypass restrictions via Microsoft Application Verifier of Antivirus, in order to escalate his privileges...
1116957, CVE-2017-5565, CVE-2017-5566, CVE-2017-5567, CVE-2017-6186, CVE-2017-6417, VIGILANCE-VUL-22211
Panda Antivirus, Panda Internet Security: privilege escalation via bcryptprimitives.dll
An attacker can create a DLL "bcryptprimitives.dll" of the installation folder of Panda Antivirus and Panda Internet Security, in order to get system privileges...
Windows: code execution during application installation
An attacker can invite the victim to download malicious libraries on Windows, in order to run code during the installation of an application requiring these DLL...
sk110055, VIGILANCE-VUL-18671
Panda AV/IS: memory corruption via PSKMAD.sys
A local attacker can generate a memory corruption in PSKMAD.sys of Panda AV/IS, in order to trigger a denial of service, and possibly to run code with system privileges...
CVE-2015-1438, VIGILANCE-VUL-17401
Panda Antivirus, Internet Security: privilege escalation via Debug
A local attacker can debug the password verification process of Panda Antivirus or Internet Security, in order to alter the configuration...
SYSS-2015-012, SYSS-2015-013, VIGILANCE-VUL-16617
Panda Security: buffer overflow of PavTPK.sys
An attacker can generate a buffer overflow in PavTPK.sys of Panda Security, in order to trigger a denial of service, and possibly to execute code with the kernel privilege level...
CVE-2014-5307, VIGILANCE-VUL-15212
Panda AV, IS: privilege escalation
A local attacker can use a vulnerability of Panda AV Pro or Internet Security, in order to escalate his privileges...
CVE-2014-3450, VIGILANCE-VUL-14777
Panda Antivirus: bypassing via CAB, ELF, EXE, TAR, ZIP
An attacker can create an archive or a program containing a virus, which is not detected by Panda Antivirus...
BID-52582, BID-52592, BID-52593, BID-52594, BID-52595, BID-52596, BID-52598, BID-52600, BID-52601, BID-52602, BID-52604, BID-52605, BID-52606, BID-52608, BID-52614, BID-52615, BID-52621, BID-52623, CVE-2012-1420, CVE-2012-1432, CVE-2012-1433, CVE-2012-1434, CVE-2012-1435, CVE-2012-1436, CVE-2012-1439, CVE-2012-1440, CVE-2012-1442, CVE-2012-1444, CVE-2012-1445, CVE-2012-1446, CVE-2012-1447, CVE-2012-1453, CVE-2012-1454, CVE-2012-1456, CVE-2012-1459, CVE-2012-1463, VIGILANCE-VUL-11471
Panda AV, IS: buffer overflow of RKPavProc.sys
A local attacker can generate a buffer overflow in the Panda RKPavProc.sys driver, in order to obtain system privileges...
20100630 80184 EN, BID-41428, NTIADV0905, VIGILANCE-VUL-9746
Antivirus: bypassing SSDT Hooking
When an antivirus redirects the SSDT to detect viruses, a local attacker can use an atomicity error, in order to bypass this protection...
CVE-2010-5151, CVE-2010-5152, CVE-2010-5154, CVE-2010-5156, CVE-2010-5161, CVE-2010-5163, CVE-2010-5166, CVE-2010-5167, CVE-2010-5168, CVE-2010-5171, CVE-2010-5172, CVE-2010-5177, CVE-2010-5179, VIGILANCE-VUL-9633
Our database contains other pages. You can request a free trial to read them.

Display information about Panda AV: