A content-security-policy vulnerability in ENS Control browser extension prior to 10.7.0 Update 15 allows a remote attacker to alter the response header parameter setting to switch the content security policy into report-only mode, allowing an attacker to bypass the content-security-policy configuration. 
                
            References
                    | Link | Resource | 
|---|---|
| https://kcm.trellix.com/corporate/index?page=content&id=SB10417 | Vendor Advisory | 
| https://kcm.trellix.com/corporate/index?page=content&id=SB10417 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 08:46
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://kcm.trellix.com/corporate/index?page=content&id=SB10417 - Vendor Advisory | 
17 Jan 2024, 20:33
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-01-10 11:15
Updated : 2024-11-21 08:46
NVD link : CVE-2024-0310
Mitre link : CVE-2024-0310
CVE.ORG link : CVE-2024-0310
JSON object : View
Products Affected
                trellix
- endpoint_security_web_control
microsoft
- windows
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
