


The vulnerability exists due to application does not properly impose security restrictions within the use of named pipes, which leads to security restrictions bypass and privilege escalation. The vulnerability allows a local user to escalate privileges on the system. Server solutions for antivurus protectionĮSET File Security for Microsoft Windows ServerĮSET Security for Microsoft SharePoint ServerĮSET Mail Security for Microsoft Exchange Serverġ) Permissions, Privileges, and Access ControlsĬWE-ID: CWE-264 - Permissions, Privileges, and Access Controls ESET Server Security for Microsoft Windows Server
