cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2010-5163,https://securityvulnerability.io/vulnerability/CVE-2010-5163,,"Race condition in Kaspersky Internet Security 2010 9.0.0.736 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute",Kaspersky,Kaspersky Internet Security 2010,,,0.0004199999966658652,false,false,false,false,,false,false,2012-08-25T21:55:00.000Z,0 CVE-2009-4452,https://securityvulnerability.io/vulnerability/CVE-2009-4452,,"Kaspersky Anti-Virus 5.0 (5.0.712); Antivirus Personal 5.0.x; Anti-Virus 6.0 (6.0.3.837), 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); and Internet Security 7 (7.0.1.325), 2009 (8.0.0.x), and 2010 (9.0.0.463); use weak permissions (Everyone:Full Control) for the BASES directory, which allows local users to gain SYSTEM privileges by replacing an executable or DLL with a Trojan horse.",kaspersky,"Kaspersky Anti-virus Personal,Kaspersky Anti-virus 2009,Kaspersky Anti-virus,Kaspersky Anti-virus 2010,Kaspersky Internet Security 2010,Kaspersky Internet Security 2009,Kaspersky Internet Security",,,0.0004199999966658652,false,false,false,false,,false,false,2009-12-29T20:15:00.000Z,0