cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2019-15689,https://securityvulnerability.io/vulnerability/CVE-2019-15689,,"Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Security Cloud prior to version 2020 patch E have bug that allows a local user to execute arbitrary code via execution compromised file placed by an attacker with administrator rights. No privilege escalation. Possible whitelisting bypass some of the security products",Kaspersky,"Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Security Cloud",6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2019-12-02T20:43:52.000Z,0 CVE-2019-15687,https://securityvulnerability.io/vulnerability/CVE-2019-15687,,"Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component was vulnerable to remote disclosure of various information about the user's system (like Windows version and version of the product, host unique ID). Information Disclosure.",Kaspersky,"Kaspersky Anti-virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-virus, Kaspersky Small Office Security, Kaspersky Security Cloud",6.5,MEDIUM,0.004110000096261501,false,false,false,false,,false,false,2019-11-26T15:45:17.000Z,0 CVE-2019-15686,https://securityvulnerability.io/vulnerability/CVE-2019-15686,,"Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component allowed an attacker remotely disable various anti-virus protection features. DoS, Bypass.",Kaspersky,"Kaspersky Anti-virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-virus, Kaspersky Small Office Security, Kaspersky Security Cloud",4.3,MEDIUM,0.0007300000288523734,false,false,false,false,,false,false,2019-11-26T15:44:49.000Z,0 CVE-2019-15685,https://securityvulnerability.io/vulnerability/CVE-2019-15685,,"Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component allowed an attacker remotely disable such product's security features as private browsing and anti-banner. Bypass.",Kaspersky,"Kaspersky Anti-virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-virus, Kaspersky Small Office Security, Kaspersky Security Cloud",4.3,MEDIUM,0.0007300000288523734,false,false,false,false,,false,false,2019-11-26T15:44:19.000Z,0 CVE-2019-15688,https://securityvulnerability.io/vulnerability/CVE-2019-15688,,"Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component did not adequately inform the user about the threat of redirecting to an untrusted site. Bypass.",Kaspersky,"Kaspersky Anti-virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-virus, Kaspersky Small Office Security, Kaspersky Security Cloud",6.1,MEDIUM,0.0007300000288523734,false,false,false,false,,false,false,2019-11-26T15:32:17.000Z,0 CVE-2019-8286,https://securityvulnerability.io/vulnerability/CVE-2019-8286,,"Information Disclosure in Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security versions up to 2019 could potentially disclose unique Product ID by forcing victim to visit a specially crafted webpage (for example, via clicking phishing link). Vulnerability has CVSS v3.0 base score 2.6",Kaspersky,"Kaspersky Anti-virus, Kaspersky Internet Security, Kaspersky Total Security",4.3,MEDIUM,0.0009800000116229057,false,false,false,false,,false,false,2019-07-18T18:34:15.000Z,0 CVE-2016-4329,https://securityvulnerability.io/vulnerability/CVE-2016-4329,,"A local denial of service vulnerability exists in window broadcast message handling functionality of Kaspersky Anti-Virus software. Sending certain unhandled window messages, an attacker can cause application termination and in the same way bypass KAV self-protection mechanism.",Kaspersky,Total Security,5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2017-01-06T21:00:00.000Z,0 CVE-2016-4306,https://securityvulnerability.io/vulnerability/CVE-2016-4306,,"Multiple information leaks exist in various IOCTL handlers of the Kaspersky Internet Security KLDISK driver. Specially crafted IOCTL requests can cause the driver to return out-of-bounds kernel memory, potentially leaking sensitive information such as privileged tokens or kernel memory addresses that may be useful in bypassing kernel mitigations. An unprivileged user can run a program from user-mode to trigger this vulnerability.",Kaspersky,Total Security,5.5,MEDIUM,0.0009599999757483602,false,false,false,false,,false,false,2017-01-06T21:00:00.000Z,0 CVE-2015-8579,https://securityvulnerability.io/vulnerability/CVE-2015-8579,,"Kaspersky Total Security 2015 15.0.2.361 allocates memory with Read, Write, Execute (RWX) permissions at predictable addresses when protecting user-mode processes, which allows attackers to bypass the DEP and ASLR protection mechanisms via unspecified vectors.",Kaspersky,Total Security 2015,,,0.0021699999924749136,false,false,false,false,,false,false,2015-12-16T18:00:00.000Z,0