Note:
This project will be discontinued after December 13, 2021. [more]
Product:
File_security
(Eset)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 6 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-12-21 | CVE-2023-5594 | Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted. | Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Server_security, Smart_security | 8.6 | ||
2022-02-09 | CVE-2021-37852 | ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM. | Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Server_security, Smart_security | 7.8 | ||
2022-05-11 | CVE-2021-37851 | Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions... | Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Server_security, Smart_security | 7.8 | ||
2022-05-10 | CVE-2022-27167 | Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Internet Security 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Smart Security Premium 11.2 versions prior to 15.1.12.0. ESET, spol. s r.o. ESET Endpoint Antivirus 6.0 versions prior to... | Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Server_security, Smart_security | 7.1 | ||
2020-04-29 | CVE-2020-11446 | ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achieving privilege escalation. | Antivirus_and_antispyware, Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Smart_security | 7.8 | ||
2021-01-26 | CVE-2020-26941 | A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place during the installation phase of ESET products. Furthermore, exploitation can only succeed when Self-Defense is disabled. Affected products are: ESET NOD32 Antivirus, ESET Internet Security, ESET Smart Security, ESET... | Endpoint_antivirus, Endpoint_security, File_security, Internet_security, Mail_security, Nod32_antivirus, Security, Smart_security | 5.5 |