Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
Unknown

CVE-2021-25252

Disclosure Date: March 03, 2021 (last updated February 22, 2025)
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.
Attacker Value
Unknown

CVE-2020-27694

Disclosure Date: November 09, 2020 (last updated November 28, 2024)
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 has updated a specific critical library that may vulnerable to attack.
Attacker Value
Unknown

CVE-2020-27017

Disclosure Date: November 09, 2020 (last updated February 22, 2025)
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to an XML External Entity Processing (XXE) vulnerability which could allow an authenticated administrator to read arbitrary local files. An attacker must already have obtained product administrator/root privileges to exploit this vulnerability.
Attacker Value
Unknown

CVE-2020-27019

Disclosure Date: November 09, 2020 (last updated February 22, 2025)
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to an information disclosure vulnerability which could allow an attacker to access a specific database and key.
Attacker Value
Unknown

CVE-2020-27016

Disclosure Date: November 09, 2020 (last updated February 22, 2025)
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a cross-site request forgery (CSRF) vulnerability which could allow an attacker to modify policy rules by tricking an authenticated administrator into accessing an attacker-controlled web page. An attacker must already have obtained product administrator/root privileges to exploit this vulnerability.
Attacker Value
Unknown

CVE-2020-27693

Disclosure Date: November 09, 2020 (last updated February 22, 2025)
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 stores administrative passwords using a hash that is considered outdated.
Attacker Value
Unknown

CVE-2020-27018

Disclosure Date: November 09, 2020 (last updated February 22, 2025)
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 is vulnerable to a server side request forgery vulnerability which could allow an authenticated attacker to abuse the product's web server and grant access to web resources or parts of local files. An attacker must already have obtained authenticated privileges on the product to exploit this vulnerability.
Attacker Value
Unknown

CVE-2018-3609

Disclosure Date: February 16, 2018 (last updated November 26, 2024)
A vulnerability in the Trend Micro InterScan Messaging Security Virtual Appliance 9.0 and 9.1 management portal could allow an unauthenticated user to access sensitive information in a particular log file that could be used to bypass authentication on vulnerable installations.
0
Attacker Value
Unknown

CVE-2017-11391

Disclosure Date: August 03, 2017 (last updated November 26, 2024)
Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the "t" parameter within modTMCSS Proxy. Formerly ZDI-CAN-4744.
0
Attacker Value
Unknown

CVE-2017-11392

Disclosure Date: August 03, 2017 (last updated November 26, 2024)
Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the "T" parameter within modTMCSS Proxy. Formerly ZDI-CAN-4745.
0