In K7 Ultimate Security versions prior to 17.0.2019, the driver file (K7RKScan.sys - this version 15.1.0.7) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of a null pointer dereference from IOCtl 0x222010 and 0x222014. At the same time, the drive is accessible to all users in the "Everyone" group.
bfb4ecddc23a05440389081ce78b782dbf92b391de062ebc99d6641e95cdaa89
SUPERAntiSpyware Professional X versions 10.0.1264 and below suffer from a privilege escalation vulnerability via dll hijacking.
51e69d31c1c8fb597a06f072d218ce2b5cab6a6aa62de2abc66818247fc4d320
GOM Player version 2.3.90.5360 man-in-the-middle proof of concept remote code execution exploit.
f2826517a53fda0ce64b48c45b78c7b264d5e4695963f36c0f2cda3c61797dce
Zillya Total Security versions 3.0.2367.0 and 3.0.2368.0 suffer from a local privilege escalation vulnerability via a symlink vulnerability when using the quarantine module.
2dd73b1e8ea08e5ab446f87179141526db439ac124db481912ba977a9d7b4e24
Internet Download Manager version 6.41 Build 3 suffers from a man-in-the-middle vulnerability that can enable an attacker to execute code on the victim's system.
c91e3d887c068869ed07efa29c9e1304cc683d984cd8274cd1ef8940678521d0