Refine your search
3 vulnerabilities found for ESET NOD32 Antivirus by ESET
CVE-2025-4952 (GCVE-0-2025-4952)
Vulnerability from nvd
Published
2025-10-31 12:28
Modified
2025-10-31 14:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Summary
Tampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product's configuration.
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ESET | ESET NOD32 Antivirus |
Patch: 1496 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-4952",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-31T14:18:06.194469Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-31T14:18:16.911Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"hips"
],
"platforms": [
"Windows"
],
"product": "ESET NOD32 Antivirus",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Internet Security",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Smart Security Premium",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Security Ultimate",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Small Business Security",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Safe Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Endpoint Antivirus",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Endpoint Security for Windows",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Server Security for Windows Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Mail Security for Microsoft Exchange Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Mail Security for IBM Domino",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Security for Microsoft SharePoint Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET File Security for Microsoft Azure",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_nod32_antivirus:1496:*:windows:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_internet_security:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_smart_security_premium:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_security_ultimate:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_small_business_security:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_safe_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_endpoint_antivirus:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_endpoint_security_for_windows:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_server_security_for_windows_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_mail_security_for_microsoft_exchange_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_mail_security_for_ibm_domino:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_security_for_microsoft_sharepoint_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_file_security_for_microsoft_azure:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"datePublic": "2025-08-22T10:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eTampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product\u0027s configuration.\u003c/span\u003e"
}
],
"value": "Tampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product\u0027s configuration."
}
],
"impacts": [
{
"capecId": "CAPEC-203",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-203 Manipulate Registry Information"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-31T12:28:15.267Z",
"orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"shortName": "ESET"
},
"references": [
{
"url": "https://support.eset.com/en/ca8853-eset-customer-advisory-denial-of-service-vulnerability-in-eset-security-products-for-windows-fixed"
}
],
"source": {
"advisory": "ca8853",
"discovery": "UNKNOWN"
},
"title": "Denial-of-service vulnerability in ESET security products for Windows",
"x_generator": {
"engine": "Vulnogram 0.4.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"assignerShortName": "ESET",
"cveId": "CVE-2025-4952",
"datePublished": "2025-10-31T12:28:15.267Z",
"dateReserved": "2025-05-19T10:36:38.958Z",
"dateUpdated": "2025-10-31T14:18:16.911Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-4952 (GCVE-0-2025-4952)
Vulnerability from cvelistv5
Published
2025-10-31 12:28
Modified
2025-10-31 14:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Summary
Tampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product's configuration.
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ESET | ESET NOD32 Antivirus |
Patch: 1496 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-4952",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-31T14:18:06.194469Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-31T14:18:16.911Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"hips"
],
"platforms": [
"Windows"
],
"product": "ESET NOD32 Antivirus",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Internet Security",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Smart Security Premium",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Security Ultimate",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Small Business Security",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Safe Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Endpoint Antivirus",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Endpoint Security for Windows",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Server Security for Windows Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Mail Security for Microsoft Exchange Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Mail Security for IBM Domino",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET Security for Microsoft SharePoint Server",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"modules": [
"HIPS support module"
],
"product": "ESET File Security for Microsoft Azure",
"vendor": "ESET",
"versions": [
{
"status": "unaffected",
"version": "1496",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_nod32_antivirus:1496:*:windows:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_internet_security:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_smart_security_premium:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_security_ultimate:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_small_business_security:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_safe_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_endpoint_antivirus:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_endpoint_security_for_windows:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_server_security_for_windows_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_mail_security_for_microsoft_exchange_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_mail_security_for_ibm_domino:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_security_for_microsoft_sharepoint_server:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eset:eset_file_security_for_microsoft_azure:1496:*:*:*:*:*:*:*",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"datePublic": "2025-08-22T10:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eTampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product\u0027s configuration.\u003c/span\u003e"
}
],
"value": "Tampering of the registry entries might have led to preventing the ESET security products from starting correctly on the next system startup or to unauthorized changes in the product\u0027s configuration."
}
],
"impacts": [
{
"capecId": "CAPEC-203",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-203 Manipulate Registry Information"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-31T12:28:15.267Z",
"orgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"shortName": "ESET"
},
"references": [
{
"url": "https://support.eset.com/en/ca8853-eset-customer-advisory-denial-of-service-vulnerability-in-eset-security-products-for-windows-fixed"
}
],
"source": {
"advisory": "ca8853",
"discovery": "UNKNOWN"
},
"title": "Denial-of-service vulnerability in ESET security products for Windows",
"x_generator": {
"engine": "Vulnogram 0.4.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "4a9b9929-2450-4021-b7b9-469a0255b215",
"assignerShortName": "ESET",
"cveId": "CVE-2025-4952",
"datePublished": "2025-10-31T12:28:15.267Z",
"dateReserved": "2025-05-19T10:36:38.958Z",
"dateUpdated": "2025-10-31T14:18:16.911Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
jvndb-2018-000083
Vulnerability from jvndb
Published
2018-07-24 14:43
Modified
2019-07-26 12:05
Severity ?
Summary
The installers of multiple Canon IT Solutions Inc. software programs may insecurely load Dynamic Link Libraries
Details
The installers of multiple software programs provided by Canon IT Solutions Inc. contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).
Yuji Tounai of NTT Communications Corporation reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000083.html",
"dc:date": "2019-07-26T12:05+09:00",
"dcterms:issued": "2018-07-24T14:43+09:00",
"dcterms:modified": "2019-07-26T12:05+09:00",
"description": "The installers of multiple software programs provided by Canon IT Solutions Inc. contain an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).\r\n\r\nYuji Tounai of NTT Communications Corporation reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2018/JVNDB-2018-000083.html",
"sec:cpe": [
{
"#text": "cpe:/a:eset:compusec",
"@product": "CompuSec",
"@vendor": "ESET",
"@version": "2.2"
},
{
"#text": "cpe:/a:eset:deslock%2b_pro",
"@product": "DESlock+ Pro",
"@vendor": "ESET",
"@version": "2.2"
},
{
"#text": "cpe:/a:eset:internet_security",
"@product": "ESET Internet Security",
"@vendor": "ESET",
"@version": "2.2"
},
{
"#text": "cpe:/a:eset:nod32_antivirus",
"@product": "ESET NOD32 Antivirus",
"@vendor": "ESET",
"@version": "2.2"
},
{
"#text": "cpe:/a:eset:smart_security",
"@product": "ESET Smart Security",
"@vendor": "ESET",
"@version": "2.2"
},
{
"#text": "cpe:/a:eset:smart_security_premium",
"@product": "ESET Smart Security Premium",
"@vendor": "ESET",
"@version": "2.2"
}
],
"sec:cvss": [
{
"@score": "6.8",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"@version": "2.0"
},
{
"@score": "7.8",
"@severity": "High",
"@type": "Base",
"@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2018-000083",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN41452671/index.html",
"@id": "JVN#41452671",
"@source": "JVN"
},
{
"#text": "https://jvn.jp/en/ta/JVNTA91240916/",
"@id": "JVNTA#91240916",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0649",
"@id": "CVE-2018-0649",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2018-0649",
"@id": "CVE-2018-0649",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-Other",
"@title": "No Mapping(CWE-Other)"
}
],
"title": "The installers of multiple Canon IT Solutions Inc. software programs may insecurely load Dynamic Link Libraries"
}