Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-1834 | A vulnerability was found in Microword eScan Antivirus 7.0.32 on Linux. It has been rated as problematic. Affected by this issue is the function removeExtraSlashes of the file /opt/MicroWorld/sbin/rtscanner of the component Folder Watch List Handler. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Oct 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Escanav
Escanav escan Anti-virus |
|
CPEs | cpe:2.3:a:escanav:escan_anti-virus:7.0.32:*:*:*:*:linux:*:* | |
Vendors & Products |
Escanav
Escanav escan Anti-virus |
Sun, 26 Jan 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in Microword eScan Antivirus 7.0.32 on Linux. It has been rated as problematic. Affected by this issue is the function removeExtraSlashes of the file /opt/MicroWorld/sbin/rtscanner of the component Folder Watch List Handler. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | Microword eScan Antivirus Folder Watch List rtscanner removeExtraSlashes stack-based overflow | |
Weaknesses | CWE-119 CWE-121 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-02-12T20:01:14.153Z
Reserved: 2025-01-26T15:37:34.889Z
Link: CVE-2025-0720

No data.

Status : Analyzed
Published: 2025-01-26T23:15:21.547
Modified: 2025-10-09T20:53:20.840
Link: CVE-2025-0720

No data.

No data.