![]() are vulnerable to Arbitrary File Write due to Cavwp.exe handling of Comodo's Antivirus database. To escalate privilege, a low-privileged attacker can use an NTFS directory junction to restore a malicious DLL from quarantine into the System32 folder.Ĭomodo Antivirus versions up to 12. has a quarantine flaw that allows privilege escalation. Web Console in Comodo UTM Firewall before 2.7.0 allows remote attackers to execute arbitrary code without authentication via a crafted URL.Ĭomodo Antivirus 12.
0 Comments
Leave a Reply. |