Filtered by vendor Trellix
Subscriptions
Filtered by product Enterprise Security Manager
Subscriptions
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-11481 | 1 Trellix | 1 Enterprise Security Manager | 2024-11-29 | 8.2 High |
A vulnerability in ESM 11.6.10 allows unauthenticated access to the internal Snowservice API. This leads to improper handling of path traversal, insecure forwarding to an AJP backend without adequate validation, and lack of authentication for accessing internal API endpoints. | ||||
CVE-2023-3313 | 1 Trellix | 1 Enterprise Security Manager | 2024-11-22 | 7.8 High |
An OS common injection vulnerability exists in the ESM certificate API, whereby incorrectly neutralized special elements may have allowed an unauthorized user to execute system command injection for the purpose of privilege escalation or to execute arbitrary commands. | ||||
CVE-2023-6071 | 1 Trellix | 1 Enterprise Security Manager | 2024-11-21 | 8.4 High |
An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possible as the input isn't correctly sanitized when adding a new data source. | ||||
CVE-2023-6070 | 1 Trellix | 1 Enterprise Security Manager | 2024-11-21 | 4.3 Medium |
A server-side request forgery vulnerability in ESM prior to version 11.6.8 allows a low privileged authenticated user to upload arbitrary content, potentially altering configuration. This is possible through the certificate validation functionality where the API accepts uploaded content and doesn't parse for invalid data | ||||
CVE-2023-3314 | 1 Trellix | 1 Enterprise Security Manager | 2024-11-21 | 8.1 High |
A vulnerability arises out of a failure to comprehensively sanitize the processing of a zip file(s). Incomplete neutralization of external commands used to control the process execution of the .zip application allows an authorized user to obtain control of the .zip application to execute arbitrary commands or obtain elevation of system privileges. |
Page 1 of 1.