Browse all 6 CVE security advisories affecting MicroWorld. AI-powered Chinese analysis, POCs, and references for each vulnerability.
MicroWorld develops cybersecurity solutions focused on threat detection and prevention for enterprises. Historically, its products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation flaws, with six CVEs documented. The company's security architecture emphasizes real-time scanning and behavioral analysis, though past incidents include authentication bypass weaknesses in some versions. MicroWorld's solutions typically integrate with existing IT infrastructure to provide malware protection and network security, though recurring vulnerabilities in web interfaces and administrative panels have exposed potential attack vectors for unauthorized access or system compromise.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2014-125118 | eScan 5.5-2 Web Management Console Command Injection — eScan Web Management ConsoleCWE-78 | 8.8 | - | 2025-07-25 |
| CVE-2025-1370 | MicroWorld eScan Antivirus Autoscan USB epsdaemon sprintf os command injection — eScan AntivirusCWE-78 | 5.3 | Medium | 2025-02-17 |
| CVE-2025-0798 | MicroWorld eScan Antivirus Quarantine rtscanner os command injection — eScan AntivirusCWE-78 | 8.1 | High | 2025-01-29 |
| CVE-2025-0797 | MicroWorld eScan Antivirus Quarantine Microworld default permission — eScan AntivirusCWE-276 | 3.3 | Low | 2025-01-29 |
| CVE-2024-13188 | MicroWorld eScan Antivirus Installation var default permission — eScan AntivirusCWE-276 | 5.3 | Medium | 2025-01-08 |
| CVE-2023-4383 | MicroWorld eScan Anti-Virus runasroot incorrect execution-assigned permissions — eScan Anti-VirusCWE-279 | 7.8 | High | 2023-08-16 |
This page lists every published CVE security advisory associated with MicroWorld. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.