Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Endpoint_antivirus
(Eset)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 14 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-07-16 | CVE-2024-3779 | Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET’s security product inoperable, provided non-default preconditions were met. | Endpoint_antivirus, Endpoint_security, Internet_security, Mail_security, Nod32, Security, Server_security, Smart_security | 5.5 | ||
2019-10-14 | CVE-2019-16519 | ESET Cyber Security 6.7.900.0 for macOS allows a local attacker to execute unauthorized commands as root by abusing an undocumented feature in scheduled tasks. | Cyber_security, Endpoint_antivirus, Endpoint_security | 7.8 | ||
2020-04-29 | CVE-2020-11446 | ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achieving privilege escalation. | Antivirus_and_antispyware, Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Smart_security | 7.8 | ||
2017-03-02 | CVE-2016-9892 | The esets_daemon service in ESET Endpoint Antivirus for macOS before 6.4.168.0 and Endpoint Security for macOS before 6.4.168.0 does not properly verify X.509 certificates from the edf.eset.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide crafted responses to license activation requests via a self-signed certificate. NOTE: this issue can be combined with CVE-2016-0718 to execute arbitrary code remotely as root. | Endpoint_antivirus, Endpoint_security | 5.9 |