CVE-2021-37852
- EPSS 0.04%
- Veröffentlicht 09.02.2022 06:15:06
- Zuletzt bearbeitet 21.11.2024 06:15:58
ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.
CVE-2021-37850
- EPSS 0.12%
- Veröffentlicht 08.11.2021 14:15:08
- Zuletzt bearbeitet 21.11.2024 06:15:58
ESET was made aware of a vulnerability in its consumer and business products for macOS that enables a user logged on to the system to stop the ESET daemon, effectively disabling the protection of the ESET security product until a system reboot.
CVE-2020-26941
- EPSS 0.03%
- Veröffentlicht 26.01.2021 18:15:45
- Zuletzt bearbeitet 21.11.2024 05:20:32
A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited...
CVE-2020-11446
- EPSS 0.07%
- Veröffentlicht 29.04.2020 14:15:17
- Zuletzt bearbeitet 21.11.2024 04:57:56
ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-...
CVE-2019-16519
- EPSS 0.11%
- Veröffentlicht 14.10.2019 16:15:10
- Zuletzt bearbeitet 21.11.2024 04:30:45
ESET Cyber Security 6.7.900.0 for macOS allows a local attacker to execute unauthorized commands as root by abusing an undocumented feature in scheduled tasks.
CVE-2016-9892
- EPSS 0.2%
- Veröffentlicht 02.03.2017 23:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The esets_daemon service in ESET Endpoint Antivirus for macOS before 6.4.168.0 and Endpoint Security for macOS before 6.4.168.0 does not properly verify X.509 certificates from the edf.eset.com SSL server, which allows man-in-the-middle attackers to ...