Vulnerabilities > Eset > Mail Security
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-07-16 | CVE-2024-3779 | Incorrect Default Permissions vulnerability in Eset products Denial of service vulnerability present shortly after product installation or upgrade, potentially allowed an attacker to render ESET’s security product inoperable, provided non-default preconditions were met. | 5.5 |
2024-01-31 | CVE-2023-7043 | Unquoted Search Path or Element vulnerability in Eset products Unquoted service path in ESET products allows to drop a prepared program to a specific location and run on boot with the NT AUTHORITY\NetworkService permissions. | 5.5 |
2023-12-21 | CVE-2023-5594 | Improper Certificate Validation vulnerability in Eset products Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted. | 8.6 |
2023-08-14 | CVE-2023-3160 | Improper Privilege Management vulnerability in Eset products The vulnerability potentially allows an attacker to misuse ESET’s file operations during the module update to delete or move files without having proper permissions. | 7.8 |
2022-05-11 | CVE-2021-37851 | Improper Handling of Exceptional Conditions vulnerability in Eset products Local privilege escalation in Windows products of ESET allows user who is logged into the system to exploit repair feature of the installer to run malicious code with higher privileges. | 7.8 |
2022-05-10 | CVE-2022-27167 | Improper Handling of Exceptional Conditions vulnerability in Eset products Privilege escalation vulnerability in Windows products of ESET, spol. | 7.1 |
2022-02-09 | CVE-2021-37852 | Improper Privilege Management vulnerability in Eset products ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM. | 7.8 |
2021-01-26 | CVE-2020-26941 | Incorrect Default Permissions vulnerability in Eset products A local (authenticated) low-privileged user can exploit a behavior in an ESET installer to achieve arbitrary file overwrite (deletion) of any file via a symlink, due to insecure permissions. | 5.5 |
2020-04-29 | CVE-2020-11446 | Link Following vulnerability in Eset products ESET Antivirus and Antispyware Module module 1553 through 1560 allows a user with limited access rights to create hard links in some ESET directories and then force the product to write through these links into files that would normally not be write-able by the user, thus achieving privilege escalation. | 7.8 |