![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-3314
https://notcve.org/view.php?id=CVE-2023-3314
03 Jul 2023 — A vulnerability arises out of a failure to comprehensively sanitize the processing of a zip file(s). Incomplete neutralization of external commands used to control the process execution of the .zip application allows an authorized user to obtain control of the .zip application to execute arbitrary commands or obtain elevation of system privileges. • https://kcm.trellix.com/corporate/index?page=content&id=SB10403 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-3313
https://notcve.org/view.php?id=CVE-2023-3313
03 Jul 2023 — An OS common injection vulnerability exists in the ESM certificate API, whereby incorrectly neutralized special elements may have allowed an unauthorized user to execute system command injection for the purpose of privilege escalation or to execute arbitrary commands. • https://kcm.trellix.com/corporate/index?page=content&id=SB10403 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-3438
https://notcve.org/view.php?id=CVE-2023-3438
03 Jul 2023 — An unquoted Windows search path vulnerability existed in the install the MOVE 4.10.x and earlier Windows install service (mvagtsce.exe). The misconfiguration allowed an unauthorized local user to insert arbitrary code into the unquoted service path to obtain privilege escalation and stop antimalware services. • https://kcm.trellix.com/corporate/index?page=content&id=SB10404 • CWE-428: Unquoted Search Path or Element •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-0976
https://notcve.org/view.php?id=CVE-2023-0976
07 Jun 2023 — A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the System Tree. A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the Sys... • https://kcm.trellix.com/corporate/index?page=content&id=SB10398 • CWE-427: Uncontrolled Search Path Element •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-1388
https://notcve.org/view.php?id=CVE-2023-1388
07 Jun 2023 — A heap-based overflow vulnerability in TA prior to version 5.7.9 allows a remote user to alter the page heap in the macmnsvc process memory block, resulting in the service becoming unavailable. • https://kcm.trellix.com/corporate/index?page=content&id=SB10398 • CWE-787: Out-of-bounds Write •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-0977
https://notcve.org/view.php?id=CVE-2023-0977
03 Apr 2023 — A heap-based overflow vulnerability in Trellix Agent (Windows and Linux) version 5.7.8 and earlier, allows a remote user to alter the page heap in the macmnsvc process memory block resulting in the service becoming unavailable. • https://kcm.trellix.com/corporate/index?page=content&id=SB10396 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-0975
https://notcve.org/view.php?id=CVE-2023-0975
03 Apr 2023 — A vulnerability exists in Trellix Agent for Windows version 5.7.8 and earlier, that allows local users, during install/upgrade workflow, to replace one of the Agent’s executables before it can be executed. This allows the user to elevate their permissions. • https://kcm.trellix.com/corporate/index?page=content&id=SB10396 • CWE-281: Improper Preservation of Permissions •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-0978
https://notcve.org/view.php?id=CVE-2023-0978
13 Mar 2023 — A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack • https://kcm.trellix.com/corporate/index?page=content&id=SB10397 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-0400
https://notcve.org/view.php?id=CVE-2023-0400
01 Feb 2023 — The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data. • https://github.com/pinpinsec/CVE-2023-0400 • CWE-427: Uncontrolled Search Path Element CWE-670: Always-Incorrect Control Flow Implementation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-0214 – XSS in Skyhigh Security SWG
https://notcve.org/view.php?id=CVE-2023-0214
18 Jan 2023 — A cross-site scripting vulnerability in Skyhigh SWG in main releases 11.x prior to 11.2.6, 10.x prior to 10.2.17, and controlled release 12.x prior to 12.0.1 allows a remote attacker to craft SWG-specific internal requests with URL paths to any third-party website, causing arbitrary content to be injected into the response when accessed through SWG. Una vulnerabilidad de cross site scripting en Skyhigh SWG en las versiones principales desde la 11.x a la 11.2.6, 10.x a la 10.2.17 y la versión controlada 12.x... • https://packetstorm.news/files/id/170756 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •