Page 2 of 22 results (0.014 seconds)

CVSS: 7.6EPSS: 4%CPEs: 1EXPL: 0

Race condition in ESET NOD32 Antivirus before 2.2289 allows remote attackers to execute arbitrary code via a crafted CAB file, which triggers heap corruption. Condición de carrera en ESET NOD32 Antivirus anterior a 2.2289 permite a atacantes remotos ejecutar códigos de su elección a través de un archivo CAB manipulado, lo cual dispara una corrupción de memoria. • http://osvdb.org/37976 http://secunia.com/advisories/26124 http://securityreason.com/securityalert/2922 http://www.eset.com/joomla/index.php?option=com_content&task=view&id=3469&Itemid=26 http://www.nruns.com/%5Bn.runs-SA-2007.016%5D%20-%20NOD32%20Antivirus%20CAB%20parsing%20Arbitrary%20Code%20Execution%20Advisory.pdf http://www.nruns.com/%5Bn.runs-SA-2007.016%5D%20-%20NOD32%20Antivirus%20CAB%20parsing%20Arbitrary%20Code%20Execution%20Advisory.txt http://www.securityfocus.com/archive/1/474244& • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 5.0EPSS: 5%CPEs: 1EXPL: 1

ESET NOD32 Antivirus before 2.2289 allows remote attackers to cause a denial of service via a crafted (1) ASPACK or (2) FSG packed file, which triggers a divide-by-zero error. ESET NOD32 Antivirus anterior a 2.2289 permite a atacantes remotos provocar denegación de servicio a través de archivos (1) ASPACK manipulados o (2) paquetes FSG, el cual dispara un error de división por cero. • http://osvdb.org/37978 http://secunia.com/advisories/26124 http://securityreason.com/securityalert/2924 http://www.eset.com/joomla/index.php?option=com_content&task=view&id=3469&Itemid=26 http://www.nruns.com/%5Bn.runs-SA-2007.018%5D%20-%20NOD32%20Antivirus%20ASPACK%20and%20FSG%20parsing%20Divide%20by%20Zero%20Advisory.pdf http://www.nruns.com/%5Bn.runs-SA-2007.018%5D%20-%20NOD32%20Antivirus%20ASPACK%20and%20FSG%20parsing%20Divide%20by%20Zero%20Advisory.txt http://www.securityfocus.com/a •

CVSS: 5.0EPSS: 5%CPEs: 1EXPL: 1

Integer overflow in ESET NOD32 Antivirus before 2.2289 allows remote attackers to cause a denial of service (CPU and disk consumption) via a crafted ASPACK packed file, which triggers an infinite loop. Desbordamiento de entero en ESET NOD32 Antivirus versiones anteriores a 2.2289 permite a atacantes remotos provocar una denegación de servicio (agotamiento de CPU y disco) mediante un fichero comprimido ASPACK manipulado, que dispara un bucle infinito. • http://osvdb.org/37977 http://secunia.com/advisories/26124 http://securityreason.com/securityalert/2923 http://www.eset.com/joomla/index.php?option=com_content&task=view&id=3469&Itemid=26 http://www.nruns.com/%5Bn.runs-SA-2007.017%5D%20-%20NOD32%20Antivirus%20ASPACK%20parsing%20Infinite%20Loop%20Advisory.pdf http://www.nruns.com/%5Bn.runs-SA-2007.017%5D%20-%20NOD32%20Antivirus%20ASPACK%20parsing%20Infinite%20Loop%20Advisory.txt http://www.securityfocus.com/archive/1/474245/100/0/threade •

CVSS: 9.3EPSS: 14%CPEs: 1EXPL: 0

Multiple stack-based buffer overflows in ESET NOD32 Antivirus before 2.70.37.0 allow remote attackers to execute arbitrary code during (1) delete/disinfect or (2) rename operations via a crafted directory name. Múltiples desbordamientos de búfer basados en pila en el Antivirus ESET NOD32 para versiones anteriores a la 2.70.37.0 permiten a atacantes remotos ejecutar código de su elección durante (1) el borrado/desinfección o (2) las operaciones de renombrado a través de un nombre de directorio modificado. • http://osvdb.org/36650 http://secunia.com/advisories/25375 http://securityreason.com/securityalert/2733 http://www.eset.com/support/news.php http://www.inkatel.com/wp-content/uploads/2007/05/Advisory.txt http://www.securityfocus.com/archive/1/469300/100/0/threaded http://www.securityfocus.com/archive/1/469337/100/0/threaded http://www.securityfocus.com/archive/1/469468/100/0/threaded http://www.securityfocus.com/bid/24098 http://www.vupen.com/english/advisories/200 •

CVSS: 9.3EPSS: 10%CPEs: 4EXPL: 0

Integer overflow in the (a) OLE2 and (b) CHM parsers for ESET NOD32 Antivirus before 1.1743 allows remote attackers to execute arbitrary code via a crafted (1) .DOC or (2) .CAB file that triggers a heap-based buffer overflow. Desbordamiento de entero en los analizadores sintácticos (a) OLE2 y (b) CHM para el Antivirus ESET NOD32 en versiones anteriores a la 1.1743 permite a atacantes remotos ejecutar código de su elección mediante ficheros (1) .DOC o (2) .CAB manipulados, lo cual dispara un desbordamiento de búfer basado en pila. • http://eset.com/support/updates.php?pageno=63 http://secunia.com/advisories/23459 http://securityreason.com/securityalert/2079 http://www.securityfocus.com/archive/1/454949/100/0/threaded http://www.securityfocus.com/archive/1/455045/100/0/threaded http://www.securityfocus.com/bid/21682 http://www.vupen.com/english/advisories/2006/5095 • CWE-189: Numeric Errors •