Product:

Endpoint_security

(Eset)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 14
Date Id Summary Products Score Patch Annotated
2022-05-10 CVE-2022-27167 Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to... Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Server_security, Smart_security 7.1
2022-05-11 CVE-2021-37851 Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions... Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Server_security, Smart_security 7.8
2023-08-14 CVE-2023-3160 The vulnerability potentially allows an attacker to misuse ESET’s file operations during the module update to delete or move files without having proper permissions. Endpoint_antivirus, Endpoint_security, Internet_security, Mail_security, Nod32, Security, Server_security, Smart_security 7.8
2023-12-21 CVE-2023-5594 Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted. Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Server_security, Smart_security 8.6
2024-01-31 CVE-2023-7043 Unquoted service path in ESET products allows to drop a prepared program to a specific location and run on boot with the NT AUTHORITY\NetworkService permissions. Endpoint_antivirus, Endpoint_security, Internet_security, Mail_security, Nod32_antivirus, Smart_security_premium 5.5
2024-07-16 CVE-2024-3779 Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET’s security product inoperable, provided non-default preconditions were met. Endpoint_antivirus, Endpoint_security, Internet_security, Mail_security, Nod32, Security, Server_security, Smart_security 5.5
2019-10-14 CVE-2019-16519 ESET Cyber Security 6.7.900.0 for macOS allows a local attacker to execute unauthorized commands as root by abusing an undocumented feature in scheduled tasks. Cyber_security, Endpoint_antivirus, Endpoint_security 7.8
2020-04-29 CVE-2020-11446 ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achieving privilege escalation. Antivirus_and_antispyware, Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Smart_security 7.8
2017-03-02 CVE-2016-9892 The esets_daemon service in ESET Endpoint Antivirus for macOS before 6.4.168.0 and Endpoint Security for macOS before 6.4.168.0 does not properly verify X.509 certificates from the edf.eset.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide crafted responses to license activation requests via a self-signed certificate. NOTE: this issue can be combined with CVE-2016-0718 to execute arbitrary code remotely as root. Endpoint_antivirus, Endpoint_security 5.9
2014-09-23 CVE-2014-4973 The ESET Personal Firewall NDIS filter (EpFwNdis.sys) driver in the Firewall Module Build 1183 (20140214) and earlier in ESET Smart Security and ESET Endpoint Security products 5.0 through 7.0 allows local users to gain privileges via a crafted argument to a 0x830020CC IOCTL call. Endpoint_security, Smart_security N/A