Vulnerabilities > Eset > Endpoint Security > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-07-16 | CVE-2024-3779 | Incorrect Default Permissions vulnerability in Eset products Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET’s security product inoperable, provided non-default preconditions were met. | 5.5 |
2024-01-31 | CVE-2023-7043 | Unquoted Search Path or Element vulnerability in Eset products Unquoted service path in ESET products allows to drop a prepared program to a specific location and run on boot with the NT AUTHORITY\NetworkService permissions. | 5.5 |
2021-11-08 | CVE-2021-37850 | Unspecified vulnerability in Eset products ESET was made aware of a vulnerability in its consumer and business products for macOS that enables a user logged on to the system to stop the ESET daemon, effectively disabling the protection of the ESET security product until a system reboot. | 5.5 |
2021-01-26 | CVE-2020-26941 | Incorrect Default Permissions vulnerability in Eset products A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. | 5.5 |
2017-03-02 | CVE-2016-9892 | Improper Certificate Validation vulnerability in Eset Endpoint Antivirus and Endpoint Security The esets_daemon service in ESET Endpoint Antivirus for macOS before 6.4.168.0 and Endpoint Security for macOS before 6.4.168.0 does not properly verify X.509 certificates from the edf.eset.com SSL server, which allows man-in-the-middle attackers to spoof this server and provide crafted responses to license activation requests via a self-signed certificate. | 5.9 |