Show filters
136 Total Results
Displaying 81-90 of 136
Sort by:
Attacker Value
Unknown
CVE-2018-6230
Disclosure Date: March 15, 2018 (last updated November 26, 2024)
A SQL injection vulnerability in an Trend Micro Email Encryption Gateway 5.5 search configuration script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system.
0
Attacker Value
Unknown
CVE-2018-6219
Disclosure Date: March 15, 2018 (last updated November 26, 2024)
An Insecure Update via HTTP vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to eavesdrop and tamper with certain types of update data.
0
Attacker Value
Unknown
CVE-2018-6223
Disclosure Date: March 15, 2018 (last updated November 26, 2024)
A missing authentication for appliance registration vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to manipulate the registration process of the product to reset configuration parameters.
0
Attacker Value
Unknown
CVE-2018-6228
Disclosure Date: March 15, 2018 (last updated November 26, 2024)
A SQL injection vulnerability in a Trend Micro Email Encryption Gateway 5.5 policy script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system.
0
Attacker Value
Unknown
CVE-2018-6227
Disclosure Date: March 15, 2018 (last updated November 26, 2024)
A stored cross-site scripting (XSS) vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to inject client-side scripts into vulnerable systems.
0
Attacker Value
Unknown
CVE-2018-6229
Disclosure Date: March 15, 2018 (last updated November 26, 2024)
A SQL injection vulnerability in an Trend Micro Email Encryption Gateway 5.5 edit policy script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system.
0
Attacker Value
Unknown
CVE-2018-6220
Disclosure Date: March 15, 2018 (last updated November 26, 2024)
An arbitrary file write vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to inject arbitrary data, which may lead to gaining code execution on vulnerable systems.
0
Attacker Value
Unknown
CVE-2018-0208
Disclosure Date: March 08, 2018 (last updated November 26, 2024)
A vulnerability in the web-based management interface of the (cloud based) Cisco Registered Envelope Service could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of the affected service. The vulnerability is due to insufficient validation of user-supplied input that is processed by the web-based management interface of the affected service. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information. Cisco Bug IDs: CSCvg74126.
0
Attacker Value
Unknown
CVE-2017-11397
Disclosure Date: December 16, 2017 (last updated November 26, 2024)
A service DLL preloading vulnerability in Trend Micro Encryption for Email versions 5.6 and below could allow an unauthenticated remote attacker to execute arbitrary code on a vulnerable system.
0
Attacker Value
Unknown
CVE-2017-12291
Disclosure Date: November 16, 2017 (last updated November 26, 2024)
Multiple vulnerabilities in the web interface of the Cisco Registered Envelope Service (a cloud-based service) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack or redirect a user of the affected service to an undesired web page. The vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface of the affected service. An attacker could exploit these vulnerabilities by persuading a user to click a malicious link or by sending an HTTP request that could cause the affected service to redirect the request to a specified malicious URL. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web interface of the affected system or allow the attacker to access sensitive browser-based information on the affected system. These types of exploits could also be used in phishing attacks that send users to malicious websites without their knowledge. Cisco Bug …
0