CVE-2008-7107 – ESET Smart Security 3.0.667.0 - Privilege Escalation (PoC)
https://notcve.org/view.php?id=CVE-2008-7107
easdrv.sys in ESET Smart Security 3.0.667.0 allows local users to cause a denial of service (crash) via a crafted IOCTL 0x222003 request to the \\.\easdrv device interface. easdrv.sys en ESET Smart Security v3.0.667.0, permite a usuarios locales provocar una denegación de servicio (caída) mediante una petición IOCTL 0x222003 manipulada al interfaz del dispositivo \\.\easdrv. • https://www.exploit-db.com/exploits/6251 http://www.securityfocus.com/bid/30719 https://exchange.xforce.ibmcloud.com/vulnerabilities/44520 • CWE-20: Improper Input Validation •
CVE-2009-0548
https://notcve.org/view.php?id=CVE-2009-0548
Cross-site scripting (XSS) vulnerability in the Additional Report Settings interface in ESET Remote Administrator before 3.0.105 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: some of these details are obtained from third party information. Vulnerabilidad de Secuencias de Comandos en Sitios Cruzados (XSS) en la interfaz Additional Report Settings de ESET Remote Administrator anterior a v3.0.105; permite a atacantes remotos inyectar secuencias de comandos Web o HTML a través de vectores no especificados. NOTA: algunos de los detalles se han obtenido de fuentes de terceros. • http://osvdb.org/51804 http://secunia.com/advisories/33805 http://www.eset.eu/support/changelog-eset-remote-administrator-3 http://www.vupen.com/english/advisories/2009/0339 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2008-5724 – ESET Smart Security 3.0.672 - 'epfw.sys' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2008-5724
The Personal Firewall driver (aka epfw.sys) 3.0.672.0 and earlier in ESET Smart Security 3.0.672 and earlier allows local users to gain privileges via a crafted IRP in a certain METHOD_NEITHER IOCTL request to \Device\Epfw that overwrites portions of memory. El driver de Personal Firewall (también conocido como epfw.sys) 3.0.672.0 y anteriores en ESET Smart Security 3.0.672 y anteriores permite a usuarios locales obtener privilegios mediante un IRP manipulado en una petición METHOD_NEITHER IOCTL a \Device\Epfw que sobrescribe porciones de memoria. • https://www.exploit-db.com/exploits/7516 http://secunia.com/advisories/33210 http://www.eset.com/joomla/index.php?option=com_content&task=view&id=4113&Itemid=5 http://www.ntinternals.org/ntiadv0807/ntiadv0807.html http://www.securityfocus.com/bid/32917 http://www.vupen.com/english/advisories/2008/3456 https://exchange.xforce.ibmcloud.com/vulnerabilities/47477 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2008-5527
https://notcve.org/view.php?id=CVE-2008-5527
ESET Smart Security, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. ESET Smart Security, cuando se utiliza Internet Explorer 6 o 7, permite a atacantes remotos eludir la detección de malware en un documento HTML colocando una cabecera MZ (alias "EXE info") al principio, y modificar el nombre del archivo a (1 ) sin extensión, (2) una extensión. txt, o (3) una extensión .jpg, como lo demuestra un documento que contiene un exploit CVE-2006-5745. • http://securityreason.com/securityalert/4723 http://www.securityfocus.com/archive/1/498995/100/0/threaded http://www.securityfocus.com/archive/1/499043/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/47435 • CWE-20: Improper Input Validation •
CVE-2008-5534
https://notcve.org/view.php?id=CVE-2008-5534
ESET NOD32 Antivirus 3662 and possibly 3440, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. ESET NOD32 Antivirus v3662 y posiblemente v3440, cuando se utiliza Internet Explorer 6 o 7, permite a atacantes remotos eludir la detección de malware en un documento HTML colocando una cabecera MZ (alias "EXE info") al principio, y modificar el nombre del archivo a (1 ) sin extensión, (2) una extensión. txt, o (3) una extensión .jpg, como lo demuestra un documento que contiene un exploit CVE-2006-5745. • http://securityreason.com/securityalert/4723 http://www.securityfocus.com/archive/1/498995/100/0/threaded http://www.securityfocus.com/archive/1/499043/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/47435 • CWE-20: Improper Input Validation •