Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
escanav vulnerabilities and exploits
(subscribe to this query)
6.1
CVSSv2
CVE-2018-6203
In eScan Antivirus 14.0.1400.2029, the driver file (econceal.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x8300210C.
Escanav Anti-virus 14.0.1400.2029
1 Github repository
10
CVSSv2
CVE-2021-26624
An local privilege escalation vulnerability due to a "runasroot" command in eScan Anti-Virus. This vulnerability is due to invalid arguments and insufficient execution conditions related to "runasroot" command. This vulnerability can induce remote malicious us...
Escanav Escan Anti-virus
6.1
CVSSv2
CVE-2018-6201
In eScan Antivirus 14.0.1400.2029, the driver file (econceal.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x830020E0 or 0x830020E4.
Escanav Anti-virus 14.0.1400.2029
1 Github repository
6.1
CVSSv2
CVE-2018-6202
In eScan Antivirus 14.0.1400.2029, the driver file (econceal.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x830020F8.
Escanav Anti-virus 14.0.1400.2029
1 Github repository
NA
CVE-2023-2875
A vulnerability, which was classified as problematic, was found in eScan Antivirus 22.0.1400.2443. Affected is the function 0x22E008u in the library PROCOBSRVESX.SYS of the component IoControlCode Handler. The manipulation leads to null pointer dereference. It is possible to laun...
Escanav Escan Anti-virus 22.0.1400.2443
NA
CVE-2023-33730
Privilege Escalation in the "GetUserCurrentPwd" function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote malicious user to retrieve password of any admin or normal user in plain text format.
Escanav Escan Management Console 14.0.1400.2281
1 Github repository
NA
CVE-2023-33731
Reflected Cross Site Scripting (XSS) in the view dashboard detail feature in Microworld Technologies eScan management console 14.0.1400.2281 allows remote malicious user to inject arbitrary code via the URL directly.
Escanav Escan Management Console 14.0.1400.2281
1 Github repository
NA
CVE-2023-33732
Cross Site Scripting (XSS) in the New Policy form in Microworld Technologies eScan management console 14.0.1400.2281 allows a remote malicious user to inject arbitrary code via the vulnerable parameters type, txtPolicyType, and Deletefileval.
Escanav Escan Management Console 14.0.1400.2281
2 Github repositories
NA
CVE-2023-34835
A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote malicious user to execute arbitrary JavaScript code via a vulnerable delete_file parameter.
Escanav Escan Management Console 14.0.1400.2281
1 Github repository
NA
CVE-2023-34836
A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote malicious user to execute arbitrary code via a crafted script to the Dtltyp and ListName parameters.
Escanav Escan Management Console 14.0.1400.2281
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »