Eset Software » Nod32 Antivirus : Security Vulnerabilities, CVEs, (Code Execution)
Multiple stack-based buffer overflows in ESET NOD32 Antivirus before 2.70.37.0 allow remote attackers to execute arbitrary code during (1) delete/disinfect or (2) rename operations via a crafted directory name.
Max CVSS
9.3
EPSS Score
14.69%
Published
2007-05-24
Updated
2018-10-16
Integer overflow in the (a) OLE2 and (b) CHM parsers for ESET NOD32 Antivirus before 1.1743 allows remote attackers to execute arbitrary code via a crafted (1) .DOC or (2) .CAB file that triggers a heap-based buffer overflow.
Max CVSS
9.3
EPSS Score
8.50%
Published
2006-12-21
Updated
2018-10-17
The GUI (nod32.exe) in NOD32 2.5 runs with SYSTEM privileges when the scheduler runs a scheduled on-demand scan, which allows local users to execute arbitrary code during a scheduled scan via unspecified attack vectors.
Max CVSS
7.2
EPSS Score
0.05%
Published
2006-04-08
Updated
2011-03-08
Heap-based buffer overflow in NOD32 2.5 with nod32.002 1.033 build 1127, with active scanning enabled, allows remote attackers to execute arbitrary code via an ARJ archive containing a file with a long filename.
Max CVSS
7.5
EPSS Score
8.60%
Published
2005-09-14
Updated
2017-07-11
Buffer overflow in Eset Software NOD32 for UNIX before 1.013 allows local users to execute arbitrary code via a long path name.
Max CVSS
7.2
EPSS Score
0.05%
Published
2003-02-19
Updated
2016-10-18
5 vulnerabilities found