Total vulnerabilities in the database
ESET products for Windows allows untrusted process to impersonate the client of a pipe, which can be leveraged by attacker to escalate privileges in the context of NT AUTHORITY\SYSTEM.
Software | From | Fixed in |
---|---|---|
eset / mail_security | 8.0 | 8.0.14006.0 |
eset / mail_security | 7.0.14008.0 | 7.3.14003.0 |
eset / mail_security | 8.0.10012.0 | 8.0.10018.0 |
eset / mail_security | 7.0.10019 | 7.3.10014.0 |
eset / internet_security | 10.0.337.1 | 15.0.18.0 |
eset / endpoint_security | 9.0 | 9.0.2032.6 |
eset / endpoint_security | 8.1 | 8.1.2031.4 |
eset / endpoint_security | 8.0 | 8.0.2028.3 |
eset / endpoint_security | 6.6.2046.0 | 7.3.2055.0 |
eset / endpoint_antivirus | 9.0 | 9.0.2032.6 |
eset / endpoint_antivirus | 8.1 | 8.1.2031.4 |
eset / endpoint_antivirus | 8.0 | 8.0.2028.3 |
eset / endpoint_antivirus | 6.6.2046.0 | 7.3.2055.0 |
eset / server_security | 8.0.12003.1 | 8.0.12003.1.x |
eset / server_security | 8.0.12003.0 | 8.0.12003.0.x |
eset / security | 7.0.15008.0 | 8.0.15004.0.x |
eset / server_security | 7.0.12016.1002 | 7.2.12004.1000.x |
eset / file_security | 7.0.12014.0 | 7.3.12006.0.x |
eset / nod32_antivirus | 10.0.337.1 | 15.0.18.0.x |
eset / smart_security | 10.0.337.1 | 15.0.18.0.x |