Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
eset nod32 antivirus vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2008-5425
ESet NOD32 2.70.0039.0000 does not properly handle (1) multipart/mixed e-mail messages with many MIME parts and possibly (2) e-mail messages with many "Content-type: message/rfc822;" headers, which allows remote malicious users to cause a denial of service (stack consum...
Eset Nod32 Antivirus 2.70.0039.0000
409
VMScore
CVE-2020-11446
ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achievi...
Eset Antivirus And Antispyware
Eset Endpoint Antivirus -
Eset Endpoint Security -
Eset File Security -
Eset Internet Security -
Eset Mail Security -
Eset Nod32 Antivirus -
Eset Smart Security -
NA
CVE-2023-7043
Unquoted service path in ESET products allows to drop a prepared program to a specific location and run on boot with the NT AUTHORITY\NetworkService permissions.
Eset Mail Security 10.1.10012.0
Eset Smart Security Premium
Eset Internet Security
Eset Nod32 Antivirus
Eset Endpoint Antivirus
Eset Endpoint Security
641
VMScore
CVE-2006-0951
The GUI (nod32.exe) in NOD32 2.5 runs with SYSTEM privileges when the scheduler runs a scheduled on-demand scan, which allows local users to execute arbitrary code during a scheduled scan via unspecified attack vectors.
Eset Software Nod32 Antivirus 2.5
828
VMScore
CVE-2007-2852
Multiple stack-based buffer overflows in ESET NOD32 Antivirus prior to 2.70.37.0 allow remote malicious users to execute arbitrary code during (1) delete/disinfect or (2) rename operations via a crafted directory name.
Eset Software Nod32 Antivirus 2.70.37.0
668
VMScore
CVE-2005-2903
Heap-based buffer overflow in NOD32 2.5 with nod32.002 1.033 build 1127, with active scanning enabled, allows remote malicious users to execute arbitrary code via an ARJ archive containing a file with a long filename.
Eset Software Nod32 Antivirus 2.5
NA
CVE-2023-5594
Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.
Eset Internet Security -
Eset Nod32 Antivirus -
Eset Smart Security -
Eset Mail Security -
Eset Security -
Eset Server Security -
Eset Server Security
Eset File Security -
Eset Endpoint Antivirus
Eset Endpoint Security -
Eset Endpoint Antivirus -
383
VMScore
CVE-2012-1449
The CAB file parser in NOD32 Antivirus 5795 and Rising Antivirus 22.83.00.03 allows remote malicious users to bypass malware detection via a CAB file with a modified vMajor field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that...
Rising-global Rising Antivirus 22.83.00.03
Eset Nod32 Antivirus 5795
383
VMScore
CVE-2012-1455
The CAB file parser in NOD32 Antivirus 5795 and Rising Antivirus 22.83.00.03 allows remote malicious users to bypass malware detection via a CAB file with a modified vMinor version field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published show...
Eset Nod32 Antivirus 5795
Rising-global Rising Antivirus 22.83.00.03
320
VMScore
CVE-2022-27167
Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows malicious user to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions ...
Eset Smart Security
Eset Internet Security
Eset Nod32 Antivirus
Eset Endpoint Antivirus
Eset Endpoint Security
Eset Security
Eset Mail Security
Eset Server Security
Eset File Security
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
IMAP
CVE-2024-4367
server-side request forgery
information disclosure
CVE-2024-34342
CVE-2024-4281
CVE-2024-3507
CVE-2024-25560
CVE-2024-34574
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »