CVE-2019-15689
02.12.2019, 21:15
Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Security Cloud prior to version 2020 patch E have bug that allows a local user to execute arbitrary code via execution compromised file placed by an attacker with administrator rights. No privilege escalation. Possible whitelisting bypass some of the security productsEnginsight
| Vendor | Product | Version |
|---|---|---|
| kaspersky | secure_connection | 3.0 |
| kaspersky | secure_connection | 4.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References