Show filters
493 Total Results
Displaying 441-450 of 493
Sort by:
Attacker Value
Unknown
CVE-2016-8589
Disclosure Date: April 28, 2017 (last updated November 26, 2024)
log_query_dae.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
0
Attacker Value
Unknown
CVE-2016-8587
Disclosure Date: April 28, 2017 (last updated November 26, 2024)
dlp_policy_upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via an archive file containing a symlink to /eng_ptn_stores/prod/sensorSDK/data/ or /eng_ptn_stores/prod/sensorSDK/backup_pol/.
0
Attacker Value
Unknown
CVE-2016-8593
Disclosure Date: April 28, 2017 (last updated November 26, 2024)
Directory traversal vulnerability in upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via a .. (dot dot) in the dID parameter.
0
Attacker Value
Unknown
CVE-2017-7896
Disclosure Date: April 18, 2017 (last updated November 26, 2024)
Trend Micro InterScan Messaging Security Virtual Appliance (IMSVA) 9.1 before CP 1644 has XSS.
0
Attacker Value
Unknown
CVE-2016-7547
Disclosure Date: April 12, 2017 (last updated November 26, 2024)
A command execution flaw on the Trend Micro Threat Discovery Appliance 2.6.1062r1 exists with the timezone parameter in the admin_sys_time.cgi interface.
0
Attacker Value
Unknown
CVE-2016-7552
Disclosure Date: April 12, 2017 (last updated November 26, 2024)
On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.
0
Attacker Value
Unknown
CVE-2017-6339
Disclosure Date: April 05, 2017 (last updated November 26, 2024)
Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 before CP 1746 mismanages certain key and certificate data. Per IWSVA documentation, by default, IWSVA acts as a private Certificate Authority (CA) and dynamically generates digital certificates that are sent to client browsers to complete a secure passage for HTTPS connections. It also allows administrators to upload their own certificates signed by a root CA. An attacker with low privileges can download the current CA certificate and Private Key (either the default ones or ones uploaded by administrators) and use those to decrypt HTTPS traffic, thus compromising confidentiality. Also, the default Private Key on this appliance is encrypted with a very weak passphrase. If an appliance uses the default Certificate and Private Key provided by Trend Micro, an attacker can simply download these and decrypt the Private Key using the default/weak passphrase.
0
Attacker Value
Unknown
CVE-2017-6340
Disclosure Date: April 05, 2017 (last updated November 26, 2024)
Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 before CP 1746 does not sanitize a rest/commonlog/report/template name field, which allows a 'Reports Only' user to inject malicious JavaScript while creating a new report. Additionally, IWSVA implements incorrect access control that allows any authenticated, remote user (even with low privileges like 'Auditor') to create or modify reports, and consequently take advantage of this XSS vulnerability. The JavaScript is executed when victims visit reports or auditlog pages.
0
Attacker Value
Unknown
CVE-2017-6338
Disclosure Date: April 05, 2017 (last updated November 26, 2024)
Multiple Access Control issues in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 before CP 1746 allow an authenticated, remote user with low privileges like 'Reports Only' or 'Auditor' to change FTP Access Control Settings, create or modify reports, or upload an HTTPS Decryption Certificate and Private Key.
0
Attacker Value
Unknown
CVE-2016-9319
Disclosure Date: March 31, 2017 (last updated November 26, 2024)
There is Missing SSL Certificate Validation in the Trend Micro Enterprise Mobile Security Android Application before 9.7.1193, aka VRTS-398.
0