Product:

Endpoint_security

(Eset)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 14
Date Id Summary Products Score Patch Annotated
2024-02-15 CVE-2024-0353 Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission. Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Server_security, Smart_security 7.8
2021-01-26 CVE-2020-26941 A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET... Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Smart_security 5.5
2021-11-08 CVE-2021-37850 ESET was made aware of a vulnerability in its consumer and business products for macOS that enables a user logged on to the system to stop the ESET daemon, effectively disabling the protection of the ESET security product until a system reboot. Cyber_security, Endpoint_antivirus, Endpoint_security 5.5
2022-02-09 CVE-2021-37852 ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM. Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Server_security, Smart_security 7.8