Show filters
37 Total Results
Displaying 11-20 of 37
Sort by:
Attacker Value
Unknown
CVE-2024-5671
Disclosure Date: June 14, 2024 (last updated June 15, 2024)
Insecure Deserialization in some workflows of the IPS Manager allows unauthenticated remote attackers to perform arbitrary code execution and access to the vulnerable Trellix IPS Manager.
0
Attacker Value
Unknown
CVE-2024-4176
Disclosure Date: June 13, 2024 (last updated July 16, 2024)
An Cross site scripting vulnerability in the EDR XConsole before this release allowed an attacker to potentially leverage an XSS/HTML-Injection using command line variables. A malicious threat actor could execute commands on the victim's browser for sending carefully crafted malicious links to the EDR XConsole end user.
0
Attacker Value
Unknown
CVE-2024-4844
Disclosure Date: May 16, 2024 (last updated May 16, 2024)
Hardcoded credentials vulnerability in Trellix ePolicy Orchestrator (ePO) on Premise prior to 5.10 Service Pack 1 Update 2 allows an attacker with admin privileges on the ePO server to read the contents of the orion.keystore file, allowing them to access the ePO database encryption key. This was possible through using a hard coded password for the keystore. Access Control restrictions on the file mean this would not be exploitable unless the user is the system admin for the server that ePO is running on.
0
Attacker Value
Unknown
CVE-2024-4843
Disclosure Date: May 16, 2024 (last updated May 16, 2024)
ePO doesn't allow a regular privileged user to delete tasks or assignments. Insecure direct object references that allow a least privileged user to manipulate the client task and client task assignments, hence escalating his/her privilege.
0
Attacker Value
Unknown
CVE-2023-6072
Disclosure Date: February 13, 2024 (last updated October 08, 2024)
A cross-site scripting vulnerability in Trellix Central Management (CM) prior to 9.1.3.97129 allows a remote authenticated attacker to craft CM dashboard internal requests causing arbitrary content to be injected into the response when accessing the CM dashboard.
0
Attacker Value
Unknown
CVE-2024-0310
Disclosure Date: January 10, 2024 (last updated January 18, 2024)
A content-security-policy vulnerability in ENS Control browser extension prior to 10.7.0 Update 15 allows a remote attacker to alter the response header parameter setting to switch the content security policy into report-only mode, allowing an attacker to bypass the content-security-policy configuration.
0
Attacker Value
Unknown
CVE-2024-0213
Disclosure Date: January 09, 2024 (last updated January 13, 2024)
A buffer overflow vulnerability in TA for Linux and TA for MacOS prior to 5.8.1 allows a local user to gain elevated permissions, or cause a Denial of Service (DoS), through exploiting a memory corruption issue in the TA service, which runs as root. This may also result in the disabling of event reporting to ePO, caused by failure to validate input from the file correctly.
0
Attacker Value
Unknown
CVE-2024-0206
Disclosure Date: January 09, 2024 (last updated January 17, 2024)
A symbolic link manipulation vulnerability in Trellix Anti-Malware Engine prior to the January 2024 release allows an authenticated local user to potentially gain an escalation of privileges. This was achieved by adding an entry to the registry under the Trellix ENS registry folder with a symbolic link to files that the user wouldn't normally have permission to. After a scan, the Engine would follow the links and remove the files
0
Attacker Value
Unknown
CVE-2023-6071
Disclosure Date: November 30, 2023 (last updated December 06, 2023)
An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possible as the input isn't correctly sanitized when adding a new data source.
0
Attacker Value
Unknown
CVE-2023-6070
Disclosure Date: November 29, 2023 (last updated December 06, 2023)
A server-side request forgery vulnerability in ESM prior to version 11.6.8 allows a low privileged authenticated user to upload arbitrary content, potentially altering configuration. This is possible through the certificate validation functionality where the API accepts uploaded content and doesn't parse for invalid data
0