Vulnerabilities > Trellix
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-09-05 | CVE-2024-5956 | Improper Authentication vulnerability in Trellix Intrusion Prevention System Manager 11.1.7.97 This vulnerability allows unauthenticated remote attackers to bypass authentication and gain partial data access to the vulnerable Trellix IPS Manager with garbage data in response mostly | 5.3 |
2024-09-05 | CVE-2024-5957 | Improper Authentication vulnerability in Trellix Intrusion Prevention System Manager 10.1 This vulnerability allows unauthenticated remote attackers to bypass authentication and gain APIs access of the Manager. | 7.5 |
2024-06-13 | CVE-2024-4176 | Cross-site Scripting vulnerability in Trellix Xconsole An Cross site scripting vulnerability in the EDR XConsole before this release allowed an attacker to potentially leverage an XSS/HTML-Injection using command line variables. | 5.4 |
2024-02-13 | CVE-2023-6072 | Cross-site Scripting vulnerability in Trellix Central Management System A cross-site scripting vulnerability in Trellix Central Management (CM) prior to 9.1.3.97129 allows a remote authenticated attacker to craft CM dashboard internal requests causing arbitrary content to be injected into the response when accessing the CM dashboard. | 5.4 |
2024-01-10 | CVE-2024-0310 | Cross-site Scripting vulnerability in Trellix Endpoint Security web Control 10.7.0 A content-security-policy vulnerability in ENS Control browser extension prior to 10.7.0 Update 15 allows a remote attacker to alter the response header parameter setting to switch the content security policy into report-only mode, allowing an attacker to bypass the content-security-policy configuration. | 6.1 |
2024-01-09 | CVE-2024-0206 | Link Following vulnerability in Trellix Anti-Malware Engine 6600 A symbolic link manipulation vulnerability in Trellix Anti-Malware Engine prior to the January 2024 release allows an authenticated local user to potentially gain an escalation of privileges. | 7.8 |
2024-01-09 | CVE-2024-0213 | Classic Buffer Overflow vulnerability in Trellix Agent A buffer overflow vulnerability in TA for Linux and TA for MacOS prior to 5.8.1 allows a local user to gain elevated permissions, or cause a Denial of Service (DoS), through exploiting a memory corruption issue in the TA service, which runs as root. | 7.8 |
2023-11-30 | CVE-2023-6071 | Command Injection vulnerability in Trellix Enterprise Security Manager 11.6.8 An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. | 7.2 |
2023-11-29 | CVE-2023-6070 | Server-Side Request Forgery (SSRF) vulnerability in Trellix Enterprise Security Manager A server-side request forgery vulnerability in ESM prior to version 11.6.8 allows a low privileged authenticated user to upload arbitrary content, potentially altering configuration. | 4.3 |
2023-11-27 | CVE-2023-5607 | Path Traversal vulnerability in Trellix Application and Change Control An improper limitation of a path name to a restricted directory (path traversal) vulnerability in the TACC ePO extension, for on-premises ePO servers, prior to version 8.4.0 could lead to an authorised administrator attacker executing arbitrary code through uploading a specially crafted GTI reputation file. | 7.2 |