Metrics
Affected Vendors & Products
Tue, 18 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 17 Feb 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux and classified as critical. Affected by this issue is the function strcpy of the component VirusPopUp. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | MicroWord eScan Antivirus VirusPopUp strcpy stack-based overflow | |
Weaknesses | CWE-119 CWE-121 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-02-18T15:58:00.838Z
Reserved: 2025-02-16T08:52:19.693Z
Link: CVE-2025-1366

Updated: 2025-02-18T15:57:48.111Z

Status : Received
Published: 2025-02-17T01:15:10.280
Modified: 2025-02-17T01:15:10.280
Link: CVE-2025-1366

No data.