escanav CVE Vulnerabilities & Metrics

Focus on escanav vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About escanav Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with escanav. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total escanav CVEs: 17
Earliest CVE date: 25 Jan 2018, 04:29 UTC
Latest CVE date: 16 Aug 2023, 20:15 UTC

Latest CVE reference: CVE-2023-4383

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical escanav CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.06

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 9
4.0-6.9 6
7.0-8.9 1
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS escanav CVEs

These are the five CVEs with the highest CVSS scores for escanav, sorted by severity first and recency.

All CVEs for escanav

CVE-2023-4383 escanav vulnerability CVSS: 6.8 16 Aug 2023, 20:15 UTC

A vulnerability, which was classified as critical, was found in MicroWorld eScan Anti-Virus 7.0.32 on Linux. This affects an unknown part of the file runasroot. The manipulation leads to incorrect execution-assigned permissions. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-237315. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2023-34838 escanav vulnerability CVSS: 0 27 Jun 2023, 18:15 UTC

A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a crafted script to the Description parameter.

CVE-2023-34837 escanav vulnerability CVSS: 0 27 Jun 2023, 18:15 UTC

A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a vulnerable parameter GrpPath.

CVE-2023-34836 escanav vulnerability CVSS: 0 27 Jun 2023, 18:15 UTC

A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary code via a crafted script to the Dtltyp and ListName parameters.

CVE-2023-34835 escanav vulnerability CVSS: 0 27 Jun 2023, 18:15 UTC

A Cross Site Scripting vulnerability in Microworld Technologies eScan Management console v.14.0.1400.2281 allows a remote attacker to execute arbitrary JavaScript code via a vulnerable delete_file parameter.

CVE-2023-33731 escanav vulnerability CVSS: 0 02 Jun 2023, 12:15 UTC

Reflected Cross Site Scripting (XSS) in the view dashboard detail feature in Microworld Technologies eScan management console 14.0.1400.2281 allows remote attacker to inject arbitrary code via the URL directly.

CVE-2023-33732 escanav vulnerability CVSS: 0 31 May 2023, 20:15 UTC

Cross Site Scripting (XSS) in the New Policy form in Microworld Technologies eScan management console 14.0.1400.2281 allows a remote attacker to inject arbitrary code via the vulnerable parameters type, txtPolicyType, and Deletefileval.

CVE-2023-33730 escanav vulnerability CVSS: 0 31 May 2023, 20:15 UTC

Privilege Escalation in the "GetUserCurrentPwd" function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote attacker to retrieve password of any admin or normal user in plain text format.

CVE-2023-2875 escanav vulnerability CVSS: 4.6 24 May 2023, 19:15 UTC

A vulnerability, which was classified as problematic, was found in eScan Antivirus 22.0.1400.2443. Affected is the function 0x22E008u in the library PROCOBSRVESX.SYS of the component IoControlCode Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-229854 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2023-31703 escanav vulnerability CVSS: 0 17 May 2023, 13:15 UTC

Cross Site Scripting (XSS) in the edit user form in Microworld Technologies eScan management console 14.0.1400.2281 allows remote attacker to inject arbitrary code via the from parameter.

CVE-2023-31702 escanav vulnerability CVSS: 0 17 May 2023, 13:15 UTC

SQL injection in the View User Profile in MicroWorld eScan Management Console 14.0.1400.2281 allows remote attacker to dump entire database and gain windows XP command shell to perform code execution on database server via GetUserCurrentPwd?UsrId=1.

CVE-2021-26624 escanav vulnerability CVSS: 10.0 01 Apr 2022, 23:15 UTC

An local privilege escalation vulnerability due to a "runasroot" command in eScan Anti-Virus. This vulnerability is due to invalid arguments and insufficient execution conditions related to "runasroot" command. This vulnerability can induce remote attackers to exploit root privileges by manipulating parameter values.

CVE-2018-18388 escanav vulnerability CVSS: 7.5 20 Dec 2018, 23:29 UTC

eScan Agent Application (MWAGENT.EXE) 4.0.2.98 in MicroWorld Technologies eScan 14.0 allows remote or local attackers to execute arbitrary commands by sending a carefully crafted payload to TCP port 2222.

CVE-2018-10098 escanav vulnerability CVSS: 4.9 13 Jul 2018, 17:29 UTC

In MicroWorld eScan Internet Security Suite (ISS) for Business 14.0.1400.2029, the driver econceal.sys allows a non-privileged user to send a 0x830020E0 IOCTL request to \\.\econceal to cause a denial of service (BSOD).

CVE-2018-6203 escanav vulnerability CVSS: 6.1 25 Jan 2018, 04:29 UTC

In eScan Antivirus 14.0.1400.2029, the driver file (econceal.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x8300210C.

CVE-2018-6202 escanav vulnerability CVSS: 6.1 25 Jan 2018, 04:29 UTC

In eScan Antivirus 14.0.1400.2029, the driver file (econceal.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x830020F8.

CVE-2018-6201 escanav vulnerability CVSS: 6.1 25 Jan 2018, 04:29 UTC

In eScan Antivirus 14.0.1400.2029, the driver file (econceal.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x830020E0 or 0x830020E4.