Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
eset server security - vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2021-37852
ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by malicious user to escalate privileges in the context of NT AUTHORITY\SYSTEM.
Eset Mail Security
Eset Internet Security
Eset Endpoint Security
Eset Endpoint Antivirus
Eset File Security
Eset Nod32 Antivirus
Eset Security
Eset Server Security
Eset Server Security 8.0.12003.0
Eset Server Security 8.0.12003.1
Eset Smart Security
8.6
CVSSv3
CVE-2023-5594
Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.
Eset Internet Security -
Eset Nod32 Antivirus -
Eset Smart Security -
Eset Mail Security -
Eset Security -
Eset Server Security -
Eset Server Security
Eset File Security -
Eset Endpoint Antivirus
Eset Endpoint Security -
Eset Endpoint Antivirus -
7.8
CVSSv3
CVE-2023-3160
The vulnerability potentially allows an malicious user to misuse ESET’s file operations during the module update to delete or move files without having proper permissions.
Eset Internet Security -
Eset Endpoint Security -
Eset Endpoint Antivirus -
Eset Smart Security -
Eset Mail Security -
Eset Nod32 -
Eset Security -
Eset Server Security -
7.1
CVSSv3
CVE-2022-27167
Privilege escalation vulnerability in Windows products of ESET, spol. s r.o. allows malicious user to exploit "Repair" and "Uninstall" features what may lead to arbitrary file deletion. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions ...
Eset Smart Security
Eset Internet Security
Eset Nod32 Antivirus
Eset Endpoint Antivirus
Eset Endpoint Security
Eset Security
Eset Mail Security
Eset Server Security
Eset File Security
7.8
CVSSv3
CVE-2021-37851
Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. This issue affects: ESET, spol. s r.o. ESET NOD32 Antivirus 11.2 versions before 15.1.12.0. ES...
Eset Smart Security
Eset Internet Security
Eset Nod32 Antivirus
Eset Endpoint Antivirus
Eset Endpoint Security
Eset Security
Eset Server Security
Eset File Security
Eset Mail Security
7.8
CVSSv3
CVE-2023-2847
During internal security analysis, a local privilege escalation vulnerability has been identified. On a machine with the affected ESET product installed, it was possible for a user with lower privileges due to improper privilege management to trigger actions with root privileges...
Eset Endpoint Antivirus
Eset Server Security
Eset Cyber Security
5.5
CVSSv3
CVE-2020-26941
A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. The possibility of exploiting this vulnerability is limited and can only take place durin...
Eset Endpoint Antivirus
Eset Endpoint Security
Eset File Security
Eset Internet Security
Eset Internet Security 1294
Eset Mail Security
Eset Nod32 Antivirus
Eset Security
Eset Smart Security
7.5
CVSSv3
CVE-2022-0615
Use-after-free in eset_rtp kernel module used in ESET products for Linux allows potential malicious user to trigger denial-of-service condition on the system.
Eset Endpoint Antivirus
Eset Server Security
5.9
CVSSv3
CVE-2016-9892
The esets_daemon service in ESET Endpoint Antivirus for macOS prior to 6.4.168.0 and Endpoint Security for macOS prior to 6.4.168.0 does not properly verify X.509 certificates from the edf.eset.com SSL server, which allows man-in-the-middle malicious users to spoof this server an...
Eset Endpoint Security 6.3.70.1
Eset Endpoint Antivirus 6.3.70.1
9.8
CVSSv3
CVE-2016-0718
Expat allows context-dependent malicious users to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
Mozilla Firefox
Apple Mac Os X
Suse Linux Enterprise Server 11
Suse Studio Onsite 1.3
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Debuginfo 11
Opensuse Leap 42.1
Suse Linux Enterprise Software Development Kit 12
Suse Linux Enterprise Server 12
Suse Linux Enterprise Desktop 12
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Libexpat Project Libexpat
Debian Debian Linux 8.0
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Mcafee Policy Auditor
Python Python
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started