Eset

Internet Security

18 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Published 18.07.2025 09:20:52
  • Last modified 22.07.2025 13:06:27

Time-of-check to time-of-use race condition vulnerability potentially allowed an attacker to use the installed ESET security software to clear the content of an arbitrary file on the file system.

  • EPSS 0.02%
  • Published 11.07.2025 06:40:28
  • Last modified 15.07.2025 13:14:49

Installation file of ESET security products on Windows allow an attacker to misuse to delete an arbitrary file without having the permissions to do so.

Media report
  • EPSS 0.03%
  • Published 07.04.2025 08:08:22
  • Last modified 16.04.2025 11:15:41

DLL Search Order Hijacking vulnerability potentially allowed an attacker with administrator privileges to load a malicious dynamic-link library and execute its code.

  • EPSS 0.04%
  • Published 27.09.2024 07:15:03
  • Last modified 30.09.2024 12:46:20

The vulnerability potentially allowed an attacker to misuse ESET’s file operations during the removal of a detected file on the Windows operating system to delete files without having proper permissions to do so.

  • EPSS 0.08%
  • Published 16.07.2024 09:15:02
  • Last modified 21.11.2024 09:30:22

Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET’s security product inoperable, provided non-default preconditions were met.

  • EPSS 0.06%
  • Published 21.06.2024 08:15:09
  • Last modified 21.11.2024 09:08:47

Local privilege escalation vulnerability allowed an attacker to misuse ESET's file operations during a restore operation from quarantine.

  • EPSS 0.1%
  • Published 15.02.2024 08:15:46
  • Last modified 23.01.2025 17:18:06

Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission.

  • EPSS 0.09%
  • Published 31.01.2024 13:15:10
  • Last modified 21.11.2024 08:45:06

Unquoted service path in ESET products allows to drop a prepared program to a specific location and run on boot with the NT AUTHORITY\NetworkService permissions.

  • EPSS 0.1%
  • Published 21.12.2023 12:15:08
  • Last modified 21.11.2024 08:42:05

Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.

  • EPSS 0.04%
  • Published 14.08.2023 10:15:09
  • Last modified 21.11.2024 08:16:35

The vulnerability potentially allows an attacker to misuse ESET’s file operations during the module update to delete or move files without having proper permissions.