Vulnerabilities > Eset > Endpoint Antivirus

DATE CVE VULNERABILITY TITLE RISK
2021-01-26 CVE-2020-26941 Incorrect Default Permissions vulnerability in Eset products
A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions.
local
low complexity
eset CWE-276
5.5
2020-04-29 CVE-2020-11446 Link Following vulnerability in Eset products
ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achieving privilege escalation.
local
low complexity
eset CWE-59
7.8
2019-10-14 CVE-2019-16519 Improper Privilege Management vulnerability in Eset products
ESET Cyber Security 6.7.900.0 for macOS allows a local attacker to execute unauthorized commands as root by abusing an undocumented feature in scheduled tasks.
local
low complexity
eset CWE-269
7.8
2017-03-02 CVE-2016-9892 Improper Certificate Validation vulnerability in Eset Endpoint Antivirus and Endpoint Security
The esets_daemon service in ESET Endpoint Antivirus for macOS before 6.4.168.0 and Endpoint Security for macOS before 6.4.168.0 does not properly verify X.509 certificates from the edf.eset.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide crafted responses to license activation requests via a self-signed certificate.
network
high complexity
eset CWE-295
5.9