Eset

Mail Security

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 27.09.2024 07:15:03
  • Zuletzt bearbeitet 30.09.2024 12:46:20

The vulnerability potentially allowed an attacker to misuse ESET’s file operations during the removal of a detected file on the Windows operating system to delete files without having proper permissions to do so.

  • EPSS 0.08%
  • Veröffentlicht 16.07.2024 09:15:02
  • Zuletzt bearbeitet 21.11.2024 09:30:22

Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET’s security product inoperable, provided non-default preconditions were met.

  • EPSS 0.1%
  • Veröffentlicht 15.02.2024 08:15:46
  • Zuletzt bearbeitet 23.01.2025 17:18:06

Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission.

  • EPSS 0.09%
  • Veröffentlicht 31.01.2024 13:15:10
  • Zuletzt bearbeitet 21.11.2024 08:45:06

Unquoted service path in ESET products allows to drop a prepared program to a specific location and run on boot with the NT AUTHORITY\NetworkService permissions.

  • EPSS 0.1%
  • Veröffentlicht 21.12.2023 12:15:08
  • Zuletzt bearbeitet 21.11.2024 08:42:05

Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.

  • EPSS 0.04%
  • Veröffentlicht 14.08.2023 10:15:09
  • Zuletzt bearbeitet 21.11.2024 08:16:35

The vulnerability potentially allows an attacker to misuse ESET’s file operations during the module update to delete or move files without having proper permissions.

  • EPSS 0.03%
  • Veröffentlicht 11.05.2022 15:15:08
  • Zuletzt bearbeitet 21.11.2024 06:15:58

Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2...

  • EPSS 0.03%
  • Veröffentlicht 10.05.2022 20:15:09
  • Zuletzt bearbeitet 21.11.2024 06:55:19

Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows attacker to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versi...

  • EPSS 0.04%
  • Veröffentlicht 09.02.2022 06:15:06
  • Zuletzt bearbeitet 21.11.2024 06:15:58

ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.

  • EPSS 0.03%
  • Veröffentlicht 26.01.2021 18:15:45
  • Zuletzt bearbeitet 21.11.2024 05:20:32

A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited...