CVE-2019-15689
02.12.2019, 21:15
Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Security Cloud prior to version 2020 patch E have bug that allows a local user to execute arbitrary code via execution compromised file placed by an attacker with administrator rights. No privilege escalation. Possible whitelisting bypass some of the security productsEnginsight
Vendor | Product | Version |
---|---|---|
kaspersky | secure_connection | 3.0 |
kaspersky | secure_connection | 4.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References