Medium
CVSS: 5.3
Tanium addressed an insertion of sensitive information into log file vulnerability in TanOS.
Medium
CVSS: 6.3
Tanium addressed a SQL injection vulnerability in Asset.
Medium
CVSS: 4.7
Tanium addressed a use-after-free vulnerability in the Cloud Workloads Enforce client extension.
Medium
CVSS: 6.5
Tanium addressed an insertion of sensitive information into log file vulnerability in Interact and TDS.
Medium
CVSS: 6.5
Tanium addressed an insertion of sensitive information into log file vulnerability in Trends.
Medium
CVSS: 6.5
Tanium addressed an insecure file permissions vulnerability in Enforce Recovery Key Portal.
Medium
CVSS: 5.5
Tanium addressed an arbitrary file deletion vulnerability in end-user-cx.
Medium
CVSS: 5.5
Tanium addressed an arbitrary file deletion vulnerability in Tanium EUSS.
High
CVSS: 7.8
Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools.
High
CVSS: 7.8
Tanium addressed a local privilege escalation vulnerability in Patch Endpoint Tools.
Medium
CVSS: 5.5
Tanium addressed an arbitrary file deletion vulnerability in End-User Notifications Endpoint Tools.
Medium
CVSS: 6.5
Tanium addressed an uncontrolled resource consumption vulnerability in Tanium Server.
Medium
CVSS: 6.7
Tanium addressed a local privilege escalation vulnerability in Tanium Server.
Medium
CVSS: 6.7
Tanium addressed a local privilege escalation vulnerability in Tanium Module Server.
Low
CVSS: 3.3
Tanium addressed a denial of service vulnerability in Tanium Client.
Medium
CVSS: 6.5
Tanium addressed an incorrect default permissions vulnerability in Enforce.
Medium
CVSS: 4.3
Tanium addressed an improper access controls vulnerability in Reputation.
Medium
CVSS: 6.5
Tanium addressed an incorrect default permissions vulnerability in Benchmark.
Medium
CVSS: 6.5
Tanium addressed an incorrect default permissions vulnerability in Comply.
Medium
CVSS: 6.5
Tanium addressed an incorrect default permissions vulnerability in Discover.