Vulnerability Details CVE-2024-0353
Local privilege escalation vulnerability potentially allowed an attacker to misuse ESET’s file operations to delete files without having proper permission.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 13.6%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2024-0353
-
cpe:2.3:a:eset:endpoint_antivirus:-
-
cpe:2.3:a:eset:endpoint_antivirus:10.0
-
cpe:2.3:a:eset:endpoint_antivirus:10.0.2049.0
-
cpe:2.3:a:eset:endpoint_antivirus:10.1
-
cpe:2.3:a:eset:endpoint_antivirus:10.1.2058.0
-
cpe:2.3:a:eset:endpoint_antivirus:11.0
-
cpe:2.3:a:eset:endpoint_antivirus:6.6.2046.0
-
cpe:2.3:a:eset:endpoint_antivirus:7.3.2055.0
-
cpe:2.3:a:eset:endpoint_antivirus:8.0
-
cpe:2.3:a:eset:endpoint_antivirus:8.0.2028.3
-
cpe:2.3:a:eset:endpoint_antivirus:8.1
-
cpe:2.3:a:eset:endpoint_antivirus:8.1.2031.4
-
cpe:2.3:a:eset:endpoint_antivirus:9.0
-
cpe:2.3:a:eset:endpoint_antivirus:9.0.2032.6
-
cpe:2.3:a:eset:endpoint_antivirus:9.1.2066.0
-
cpe:2.3:a:eset:endpoint_security:-
-
cpe:2.3:a:eset:endpoint_security:10.0
-
cpe:2.3:a:eset:endpoint_security:10.0.2049.0
-
cpe:2.3:a:eset:endpoint_security:10.1
-
cpe:2.3:a:eset:endpoint_security:10.1.2058.0
-
cpe:2.3:a:eset:endpoint_security:11.0
-
cpe:2.3:a:eset:endpoint_security:6.6.2046.0
-
cpe:2.3:a:eset:endpoint_security:7.3.2055.0
-
cpe:2.3:a:eset:endpoint_security:8.0
-
cpe:2.3:a:eset:endpoint_security:8.0.2028.3
-
cpe:2.3:a:eset:endpoint_security:8.1
-
cpe:2.3:a:eset:endpoint_security:8.1.2031.4
-
cpe:2.3:a:eset:endpoint_security:8.1.2052.0
-
cpe:2.3:a:eset:endpoint_security:9.0
-
cpe:2.3:a:eset:endpoint_security:9.0.2032.6
-
cpe:2.3:a:eset:endpoint_security:9.1.2066.0
-
cpe:2.3:a:eset:file_security:-
-
cpe:2.3:a:eset:internet_security:-
-
cpe:2.3:a:eset:internet_security:10.0.337.1
-
cpe:2.3:a:eset:internet_security:13.2
-
cpe:2.3:a:eset:internet_security:15.0.18.0
-
cpe:2.3:a:eset:internet_security:16.1.14.0
-
cpe:2.3:a:eset:internet_security:16.2.15.0
-
cpe:2.3:a:eset:mail_security:-
-
cpe:2.3:a:eset:mail_security:10.0
-
cpe:2.3:a:eset:mail_security:10.0.10017.0
-
cpe:2.3:a:eset:mail_security:10.0.14006.0
-
cpe:2.3:a:eset:mail_security:10.1
-
cpe:2.3:a:eset:mail_security:10.1.10012.0
-
cpe:2.3:a:eset:mail_security:7.0.10019
-
cpe:2.3:a:eset:mail_security:7.0.14008.0
-
cpe:2.3:a:eset:mail_security:7.2
-
cpe:2.3:a:eset:mail_security:7.3.10014.0
-
cpe:2.3:a:eset:mail_security:7.3.14003.0
-
cpe:2.3:a:eset:mail_security:8.0
-
cpe:2.3:a:eset:mail_security:8.0.10012.0
-
cpe:2.3:a:eset:mail_security:8.0.10018.0
-
cpe:2.3:a:eset:mail_security:8.0.10022.0
-
cpe:2.3:a:eset:mail_security:8.0.14006.0
-
cpe:2.3:a:eset:mail_security:8.0.14010.0
-
cpe:2.3:a:eset:mail_security:9.0
-
cpe:2.3:a:eset:mail_security:9.0.10011.0
-
cpe:2.3:a:eset:mail_security:9.0.14007.0
-
cpe:2.3:a:eset:nod32_antivirus:-
-
cpe:2.3:a:eset:nod32_antivirus:10.0.337.1
-
cpe:2.3:a:eset:nod32_antivirus:13.2
-
cpe:2.3:a:eset:nod32_antivirus:15.0.18.0
-
cpe:2.3:a:eset:nod32_antivirus:16.1.14.0
-
cpe:2.3:a:eset:nod32_antivirus:16.2.15.0
-
cpe:2.3:a:eset:nod32_antivirus:4
-
cpe:2.3:a:eset:nod32_antivirus:7.3
-
cpe:2.3:a:eset:security:-
-
cpe:2.3:a:eset:security:10.0
-
cpe:2.3:a:eset:security:10.0.15004.0
-
cpe:2.3:a:eset:security:16.2.15.0
-
cpe:2.3:a:eset:security:7.2
-
cpe:2.3:a:eset:security:8.0
-
cpe:2.3:a:eset:security:8.0.15011.0
-
cpe:2.3:a:eset:security:9.0
-
cpe:2.3:a:eset:security:9.0.14007.0
-
cpe:2.3:a:eset:server_security:-
-
cpe:2.3:a:eset:server_security:10.0
-
cpe:2.3:a:eset:server_security:10.0.12014.0
-
cpe:2.3:a:eset:server_security:8.0
-
cpe:2.3:a:eset:server_security:8.0.12003.0
-
cpe:2.3:a:eset:server_security:8.0.12003.1
-
cpe:2.3:a:eset:server_security:8.0.12015.0
-
cpe:2.3:a:eset:server_security:9.0
-
cpe:2.3:a:eset:server_security:9.0.12018.0
-
cpe:2.3:a:eset:smart_security:-
-
cpe:2.3:a:eset:smart_security:10.0.337.1
-
cpe:2.3:a:eset:smart_security:13.2
-
cpe:2.3:a:eset:smart_security:15.0.18.0
-
cpe:2.3:a:eset:smart_security:16.2.15.0