Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
eset nod32 antivirus vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-5425
ESet NOD32 2.70.0039.0000 does not properly handle (1) multipart/mixed e-mail messages with many MIME parts and possibly (2) e-mail messages with many "Content-type: message/rfc822;" headers, which allows remote malicious users to cause a denial of service (stack consum...
Eset Nod32 Antivirus 2.70.0039.0000
7.8
CVSSv3
CVE-2020-11446
ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achievi...
Eset Antivirus And Antispyware
Eset Endpoint Antivirus -
Eset Endpoint Security -
Eset File Security -
Eset Internet Security -
Eset Mail Security -
Eset Nod32 Antivirus -
Eset Smart Security -
NA
CVE-2005-2903
Heap-based buffer overflow in NOD32 2.5 with nod32.002 1.033 build 1127, with active scanning enabled, allows remote malicious users to execute arbitrary code via an ARJ archive containing a file with a long filename.
Eset Software Nod32 Antivirus 2.5
NA
CVE-2007-2852
Multiple stack-based buffer overflows in ESET NOD32 Antivirus prior to 2.70.37.0 allow remote malicious users to execute arbitrary code during (1) delete/disinfect or (2) rename operations via a crafted directory name.
Eset Software Nod32 Antivirus 2.70.37.0
NA
CVE-2006-0951
The GUI (nod32.exe) in NOD32 2.5 runs with SYSTEM privileges when the scheduler runs a scheduled on-demand scan, which allows local users to execute arbitrary code during a scheduled scan via unspecified attack vectors.
Eset Software Nod32 Antivirus 2.5
5.5
CVSSv3
CVE-2023-7043
Unquoted service path in ESET products allows to drop a prepared program to a specific location and run on boot with the NT AUTHORITY\NetworkService permissions.
Eset Mail Security 10.1.10012.0
Eset Smart Security Premium
Eset Internet Security
Eset Nod32 Antivirus
Eset Endpoint Antivirus
Eset Endpoint Security
NA
CVE-2012-1449
The CAB file parser in NOD32 Antivirus 5795 and Rising Antivirus 22.83.00.03 allows remote malicious users to bypass malware detection via a CAB file with a modified vMajor field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that...
Rising-global Rising Antivirus 22.83.00.03
Eset Nod32 Antivirus 5795
NA
CVE-2012-1455
The CAB file parser in NOD32 Antivirus 5795 and Rising Antivirus 22.83.00.03 allows remote malicious users to bypass malware detection via a CAB file with a modified vMinor version field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published show...
Eset Nod32 Antivirus 5795
Rising-global Rising Antivirus 22.83.00.03
8.6
CVSSv3
CVE-2023-5594
Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.
Eset Internet Security -
Eset Nod32 Antivirus -
Eset Smart Security -
Eset Mail Security -
Eset Security -
Eset Server Security -
Eset Server Security
Eset File Security -
Eset Endpoint Antivirus
Eset Endpoint Security -
Eset Endpoint Antivirus -
7.8
CVSSv3
CVE-2021-37851
Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions before 15.1.12.0. ES...
Eset Smart Security
Eset Internet Security
Eset Nod32 Antivirus
Eset Endpoint Antivirus
Eset Endpoint Security
Eset Security
Eset Server Security
Eset File Security
Eset Mail Security
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »