Show filters
27 Total Results
Displaying 1-10 of 27
Sort by:
Attacker Value
Unknown
CVE-2023-44487
Disclosure Date: October 10, 2023 (last updated June 28, 2024)
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
1
Attacker Value
Unknown
CVE-2023-0978
Disclosure Date: March 13, 2023 (last updated November 08, 2023)
A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack
0
Attacker Value
Unknown
CVE-2020-7270
Disclosure Date: April 15, 2021 (last updated November 08, 2023)
Exposure of Sensitive Information in the web interface in McAfee Advanced Threat Defense (ATD) prior to 4.12.2 allows remote authenticated users to view sensitive unencrypted information via a carefully crafted HTTP request parameter. The risk is partially mitigated if your ATD instances are deployed as recommended with no direct access from the Internet to them.
0
Attacker Value
Unknown
CVE-2020-7269
Disclosure Date: April 15, 2021 (last updated November 08, 2023)
Exposure of Sensitive Information in the web interface in McAfee Advanced Threat Defense (ATD) prior to 4.12.2 allows remote authenticated users to view sensitive unencrypted information via a carefully crafted HTTP request parameter. The risk is partially mitigated if your ATD instances are deployed as recommended with no direct access from the Internet to them.
0
Attacker Value
Unknown
CVE-2020-7262
Disclosure Date: June 18, 2020 (last updated February 21, 2025)
Improper Access Control vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.10.0 allows local users to view sensitive files via a carefully crafted HTTP request parameter.
0
Attacker Value
Unknown
CVE-2020-7254
Disclosure Date: March 10, 2020 (last updated February 21, 2025)
Privilege Escalation vulnerability in the command line interface in McAfee Advanced Threat Defense (ATD) 4.x prior to 4.8.2 allows local users to execute arbitrary code via improper access controls on the sudo command.
0
Attacker Value
Unknown
Advanced Threat Defense (ATD) - Improper Neutralization of Special Elements use…
Disclosure Date: November 14, 2019 (last updated November 08, 2023)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to execute database commands via carefully constructed time based payloads.
0
Attacker Value
Unknown
Advanced Threat Defense (ATD) - Path Traversal: '/absolute/pathname/here' vulne…
Disclosure Date: November 14, 2019 (last updated November 08, 2023)
Path Traversal: '/absolute/pathname/here' vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to gain unintended access to files on the system via carefully constructed HTTP requests.
0
Attacker Value
Unknown
Advanced Threat Defense (ATD) - Unprotected storage of shared credentials vulne…
Disclosure Date: November 14, 2019 (last updated November 08, 2023)
Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows local attacker to gain access to the root password via accessing sensitive files on the system. This was originally published with a CVSS rating of High, further investigation has resulted in this being updated to Critical. The root password is common across all instances of ATD prior to 4.8. See the Security bulletin for further details
0
Attacker Value
Unknown
Advanced Threat Defense (ATD) - Information Disclosure vulnerability
Disclosure Date: November 13, 2019 (last updated November 08, 2023)
Information Disclosure vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attackers to gain access to hashed credentials via carefully constructed POST request extracting incorrectly recorded data from log files.
0