Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-2124 | A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux and classified as critical. Affected by this issue is the function strcpy of the component VirusPopUp. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Oct 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Escanav
Escanav escan Anti-virus |
|
CPEs | cpe:2.3:a:escanav:escan_anti-virus:7.0.32:*:*:*:*:linux:*:* | |
Vendors & Products |
Escanav
Escanav escan Anti-virus |
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 18 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 17 Feb 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux and classified as critical. Affected by this issue is the function strcpy of the component VirusPopUp. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | MicroWord eScan Antivirus VirusPopUp strcpy stack-based overflow | |
Weaknesses | CWE-119 CWE-121 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-02-18T15:58:00.838Z
Reserved: 2025-02-16T08:52:19.693Z
Link: CVE-2025-1366

Updated: 2025-02-18T15:57:48.111Z

Status : Analyzed
Published: 2025-02-17T01:15:10.280
Modified: 2025-10-09T20:44:47.797
Link: CVE-2025-1366

No data.

No data.