Shawar Khan reported several security vulnerabilities to ESET between July 8-29, 2015, including SQL injection, POODLE vulnerabilities, weak cipher suites, and XSS/HTML injection issues. ESET thanks Shawar for helping them improve security and prevent exploitation of these vulnerabilities. Chief Information Security Officer Daniel Chromek expressed best regards on behalf of ESET.
1 of 1
Download to read offline
More Related Content
7th Certificate from Eset
1. ESET, spol. s r.o., Einsteinova 24, 851 01 Bratislava, Slovak Republic
Registered in the Commercial Register of the District Court Bratislava I., Section Sro, Insertion No 3586/B, BIN: 31 333 532
VAT ID: SK2020317068, Bank account: 1421047-012/0200, IBAN: SK93 0200 0000 0014 2104 7012, BIC: SUBA-SKBX
tel.: +421 2 322 44 111, fax: +421 2 322 44 109, www.eset.sk
Acknowledgement for reporting security vulnerability
ESET Security team would like to officially thank Shawar Khan for reporting following vulnerabilities:
ï‚· SQL injection in eset.com and esetme.com on July 17, 2015
ï‚· POODLE vulnerability in enjoysaferinternet.com on July 08, 2015
ï‚· POODLE vulnerability in eset.com.tr on July 09, 2015
ï‚· Weak cipher suite in shop.eset.com on July 12, 2015
ï‚· XSS in eset.com.br on July 25, 2015
ï‚· HTML injection in eset.com.br on July 25, 2015
ï‚· XSS & HTML Injection Vulnerability in eset.ee on July 29, 2015
This information has helped us to improve security of our online services and has prevented malicious
exploitation of this vulnerability.
Best regards,
Daniel Chromek
Chief Information Security Officer
ESET s.r.o.
Einsteinova 24
851 01 Bratislava
Slovakia