Added |
CPE Configuration |
|
OR
*cpe:2.3:a:eset:cyber_security:*:*:*:*:*:mac_os:*:* versions up to (excluding) 1296
*cpe:2.3:a:eset:cyber_security:*:*:*:*:pro:mac_os:*:* versions up to (excluding) 1296
*cpe:2.3:a:eset:internet_security:*:*:*:*:*:*:*:* versions up to (excluding) 1296
*cpe:2.3:a:eset:mobile_security:*:*:*:*:*:android:*:* versions up to (excluding) 1296
*cpe:2.3:a:eset:nod32_antivirus:4:*:*:*:*:linux:*:*
*cpe:2.3:a:eset:nod32_antivirus:*:*:*:*:*:*:*:* versions up to (excluding) 1296
*cpe:2.3:a:eset:smart_security:*:*:*:*:premium:*:*:* versions up to (excluding) 1296
*cpe:2.3:a:eset:smart_tv_security:*:*:*:*:*:*:*:* versions up to (excluding) 1296
|
Added |
CVSS V2 |
|
NIST (AV:N/AC:M/Au:N/C:N/I:P/A:N)
|
Added |
CVSS V2 Metadata |
|
Victim must voluntarily interact with attack mechanism
|
Added |
CVSS V3.1 |
|
NIST AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
|
Added |
CWE |
|
NIST CWE-20
|
Changed |
Reference Type |
http://seclists.org/fulldisclosure/2020/Feb/21 No Types Assigned
|
http://seclists.org/fulldisclosure/2020/Feb/21 Mailing List, Third Party Advisory
|
Changed |
Reference Type |
https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html No Types Assigned
|
https://blog.zoller.lu/p/tzo-11-2020-eset-generic-malformed.html Third Party Advisory
|
Changed |
Reference Type |
https://support.eset.com/en/ca7387-modules-review-december-2019 No Types Assigned
|
https://support.eset.com/en/ca7387-modules-review-december-2019 Release Notes
|