Vulnerabilites related to Trend Micro - Trend Micro InterScan Web Security Virtual Appliance
cve-2020-28578
Vulnerability from cvelistv5
Published
2020-11-18 18:45
Modified
2024-08-04 16:40
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an unauthenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000281954 | x_refsource_MISC | |
https://www.tenable.com/security/research/tra-2020-63 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 SP2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:40:59.453Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281954" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2020-63" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5 SP2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an unauthenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthenticated Remote Stack Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-18T18:45:39", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281954" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/security/research/tra-2020-63" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-28578", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5 SP2" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an unauthenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthenticated Remote Stack Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000281954", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281954" }, { "name": "https://www.tenable.com/security/research/tra-2020-63", "refsource": "MISC", "url": "https://www.tenable.com/security/research/tra-2020-63" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-28578", "datePublished": "2020-11-18T18:45:39", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-08-04T16:40:59.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28579
Vulnerability from cvelistv5
Published
2020-11-18 18:45
Modified
2024-08-04 16:40
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000281954 | x_refsource_MISC | |
https://www.tenable.com/security/research/tra-2020-63 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 SP2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:40:59.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281954" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2020-63" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5 SP2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Authenticated Remote Stack Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-18T18:45:40", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281954" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/security/research/tra-2020-63" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-28579", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5 SP2" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authenticated Remote Stack Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000281954", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281954" }, { "name": "https://www.tenable.com/security/research/tra-2020-63", "refsource": "MISC", "url": "https://www.tenable.com/security/research/tra-2020-63" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-28579", "datePublished": "2020-11-18T18:45:40", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-08-04T16:40:59.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8462
Vulnerability from cvelistv5
Published
2020-12-17 21:05
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 SP2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:44.665Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000283077" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5 SP2" } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product." } ], "problemTypes": [ { "descriptions": [ { "description": "XSS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-17T21:05:45", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000283077" }, { "tags": [ "x_refsource_MISC" ], "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-8462", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5 SP2" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XSS" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000283077", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000283077" }, { "name": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/", "refsource": "MISC", "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-8462", "datePublished": "2020-12-17T21:05:45", "dateReserved": "2020-01-30T00:00:00", "dateUpdated": "2024-08-04T10:03:44.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8603
Vulnerability from cvelistv5
Published
2020-05-27 22:45
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
A cross-site scripting vulnerability (XSS) in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow a remote attacker to tamper with the web interface of affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-20-675/ | x_refsource_MISC | |
https://success.trendmicro.com/solution/000253095 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.332Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-675/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000253095" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-site scripting vulnerability (XSS) in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow a remote attacker to tamper with the web interface of affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file." } ], "problemTypes": [ { "descriptions": [ { "description": "XSS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-27T22:45:21", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-675/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000253095" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-8603", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting vulnerability (XSS) in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow a remote attacker to tamper with the web interface of affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XSS" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-675/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-675/" }, { "name": "https://success.trendmicro.com/solution/000253095", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000253095" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-8603", "datePublished": "2020-05-27T22:45:21", "dateReserved": "2020-02-04T00:00:00", "dateUpdated": "2024-08-04T10:03:46.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8465
Vulnerability from cvelistv5
Published
2020-12-17 21:05
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to manipulate system updates using a combination of CSRF bypass (CVE-2020-8461) and authentication bypass (CVE-2020-8464) to execute code as user root.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 SP2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:44.874Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000283077" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5 SP2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to manipulate system updates using a combination of CSRF bypass (CVE-2020-8461) and authentication bypass (CVE-2020-8464) to execute code as user root." } ], "problemTypes": [ { "descriptions": [ { "description": "Command Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-17T21:05:47", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000283077" }, { "tags": [ "x_refsource_MISC" ], "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-8465", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5 SP2" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to manipulate system updates using a combination of CSRF bypass (CVE-2020-8461) and authentication bypass (CVE-2020-8464) to execute code as user root." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Command Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000283077", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000283077" }, { "name": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/", "refsource": "MISC", "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-8465", "datePublished": "2020-12-17T21:05:47", "dateReserved": "2020-01-30T00:00:00", "dateUpdated": "2024-08-04T10:03:44.874Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8604
Vulnerability from cvelistv5
Published
2020-05-27 22:45
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to disclose sensitive informatoin on affected installations.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.361Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-678/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000253095" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to disclose sensitive informatoin on affected installations." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-14T21:06:15", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-678/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000253095" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-8604", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to disclose sensitive informatoin on affected installations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-678/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-678/" }, { "name": "https://success.trendmicro.com/solution/000253095", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000253095" }, { "name": "http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html" }, { "name": "http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-8604", "datePublished": "2020-05-27T22:45:22", "dateReserved": "2020-02-04T00:00:00", "dateUpdated": "2024-08-04T10:03:46.361Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8606
Vulnerability from cvelistv5
Published
2020-05-27 22:45
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to bypass authentication on affected installations of Trend Micro InterScan Web Security Virtual Appliance.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.240Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-677/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000253095" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to bypass authentication on affected installations of Trend Micro InterScan Web Security Virtual Appliance." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication Bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-14T21:06:14", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-677/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000253095" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-8606", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to bypass authentication on affected installations of Trend Micro InterScan Web Security Virtual Appliance." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication Bypass" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-677/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-677/" }, { "name": "https://success.trendmicro.com/solution/000253095", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000253095" }, { "name": "http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html" }, { "name": "http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-8606", "datePublished": "2020-05-27T22:45:23", "dateReserved": "2020-02-04T00:00:00", "dateUpdated": "2024-08-04T10:03:46.240Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28581
Vulnerability from cvelistv5
Published
2020-11-18 18:45
Modified
2024-08-04 16:40
Severity ?
EPSS score ?
Summary
A command injection vulnerability in ModifyVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000281954 | x_refsource_MISC | |
https://www.tenable.com/security/research/tra-2020-63 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 SP2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:40:59.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281954" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2020-63" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5 SP2" } ] } ], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability in ModifyVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Authenticated Command Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-18T18:45:40", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281954" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/security/research/tra-2020-63" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-28581", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5 SP2" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A command injection vulnerability in ModifyVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authenticated Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000281954", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281954" }, { "name": "https://www.tenable.com/security/research/tra-2020-63", "refsource": "MISC", "url": "https://www.tenable.com/security/research/tra-2020-63" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-28581", "datePublished": "2020-11-18T18:45:41", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-08-04T16:40:59.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8605
Vulnerability from cvelistv5
Published
2020-05-27 22:45
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.260Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-676/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000253095" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "RCE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-14T21:06:15", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-676/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000253095" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-8605", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "RCE" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-676/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-676/" }, { "name": "https://success.trendmicro.com/solution/000253095", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000253095" }, { "name": "http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/158171/Trend-Micro-Web-Security-Virtual-Appliance-Remote-Code-Execution.html" }, { "name": "http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/158423/Trend-Micro-Web-Security-Remote-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-8605", "datePublished": "2020-05-27T22:45:22", "dateReserved": "2020-02-04T00:00:00", "dateUpdated": "2024-08-04T10:03:46.260Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31521
Vulnerability from cvelistv5
Published
2021-06-17 11:42
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
Trend Micro InterScan Web Security Virtual Appliance version 6.5 was found to have a reflected cross-site scripting (XSS) vulnerability in the product's Captive Portal.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000286452 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 SP2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.221Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000286452" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance ", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5 SP2" } ] } ], "descriptions": [ { "lang": "en", "value": "Trend Micro InterScan Web Security Virtual Appliance version 6.5 was found to have a reflected cross-site scripting (XSS) vulnerability in the product\u0027s Captive Portal." } ], "problemTypes": [ { "descriptions": [ { "description": "Reflected XSS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-17T11:42:50", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000286452" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-31521", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance ", "version": { "version_data": [ { "version_value": "6.5 SP2" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Trend Micro InterScan Web Security Virtual Appliance version 6.5 was found to have a reflected cross-site scripting (XSS) vulnerability in the product\u0027s Captive Portal." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Reflected XSS" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000286452", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000286452" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-31521", "datePublished": "2021-06-17T11:42:50", "dateReserved": "2021-04-20T00:00:00", "dateUpdated": "2024-08-03T23:03:33.221Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27010
Vulnerability from cvelistv5
Published
2020-12-17 21:05
Modified
2024-08-04 16:03
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product in a manner separate from the similar CVE-2020-8462.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000283077 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 SP2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:03:23.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000283077" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5 SP2" } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product in a manner separate from the similar CVE-2020-8462." } ], "problemTypes": [ { "descriptions": [ { "description": "XSS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-17T21:05:44", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000283077" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-27010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5 SP2" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product in a manner separate from the similar CVE-2020-8462." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XSS" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000283077", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000283077" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-27010", "datePublished": "2020-12-17T21:05:44", "dateReserved": "2020-10-12T00:00:00", "dateUpdated": "2024-08-04T16:03:23.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8463
Vulnerability from cvelistv5
Published
2020-12-17 21:05
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to bypass a global authorization check for anonymous users by manipulating request paths.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 SP2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:44.801Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000283077" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5 SP2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to bypass a global authorization check for anonymous users by manipulating request paths." } ], "problemTypes": [ { "descriptions": [ { "description": "Authorization Bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-17T21:05:46", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000283077" }, { "tags": [ "x_refsource_MISC" ], "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-8463", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5 SP2" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to bypass a global authorization check for anonymous users by manipulating request paths." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authorization Bypass" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000283077", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000283077" }, { "name": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/", "refsource": "MISC", "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-8463", "datePublished": "2020-12-17T21:05:46", "dateReserved": "2020-01-30T00:00:00", "dateUpdated": "2024-08-04T10:03:44.801Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8461
Vulnerability from cvelistv5
Published
2020-12-17 21:05
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
A CSRF protection bypass vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to get a victim's browser to send a specifically encoded request without requiring a valid CSRF token.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 SP2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:44.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000283077" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5 SP2" } ] } ], "descriptions": [ { "lang": "en", "value": "A CSRF protection bypass vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to get a victim\u0027s browser to send a specifically encoded request without requiring a valid CSRF token." } ], "problemTypes": [ { "descriptions": [ { "description": "CSRF Protection Bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-17T21:05:44", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000283077" }, { "tags": [ "x_refsource_MISC" ], "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-8461", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5 SP2" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A CSRF protection bypass vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to get a victim\u0027s browser to send a specifically encoded request without requiring a valid CSRF token." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CSRF Protection Bypass" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000283077", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000283077" }, { "name": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/", "refsource": "MISC", "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-8461", "datePublished": "2020-12-17T21:05:45", "dateReserved": "2020-01-30T00:00:00", "dateUpdated": "2024-08-04T10:03:44.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-28580
Vulnerability from cvelistv5
Published
2020-11-18 18:45
Modified
2024-08-04 16:40
Severity ?
EPSS score ?
Summary
A command injection vulnerability in AddVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000281954 | x_refsource_MISC | |
https://www.tenable.com/security/research/tra-2020-63 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 SP2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:40:59.935Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281954" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2020-63" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5 SP2" } ] } ], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability in AddVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Authenticated Command Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-18T18:45:40", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281954" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/security/research/tra-2020-63" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-28580", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5 SP2" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A command injection vulnerability in AddVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authenticated Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000281954", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281954" }, { "name": "https://www.tenable.com/security/research/tra-2020-63", "refsource": "MISC", "url": "https://www.tenable.com/security/research/tra-2020-63" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-28580", "datePublished": "2020-11-18T18:45:40", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-08-04T16:40:59.935Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8466
Vulnerability from cvelistv5
Published
2020-12-17 21:05
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
A command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2, with the improved password hashing method enabled, could allow an unauthenticated attacker to execute certain commands by providing a manipulated password.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 SP2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:44.800Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000283077" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5 SP2" } ] } ], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2, with the improved password hashing method enabled, could allow an unauthenticated attacker to execute certain commands by providing a manipulated password." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthenticated Command Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-17T21:05:48", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000283077" }, { "tags": [ "x_refsource_MISC" ], "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-8466", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5 SP2" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2, with the improved password hashing method enabled, could allow an unauthenticated attacker to execute certain commands by providing a manipulated password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthenticated Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000283077", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000283077" }, { "name": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/", "refsource": "MISC", "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-8466", "datePublished": "2020-12-17T21:05:48", "dateReserved": "2020-01-30T00:00:00", "dateUpdated": "2024-08-04T10:03:44.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8464
Vulnerability from cvelistv5
Published
2020-12-17 21:05
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to send requests that appear to come from the localhost which could expose the product's admin interface to users who would not normally have access.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Version: 6.5 SP2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:44.846Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000283077" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5 SP2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to send requests that appear to come from the localhost which could expose the product\u0027s admin interface to users who would not normally have access." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication Bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-17T21:05:46", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000283077" }, { "tags": [ "x_refsource_MISC" ], "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-8464", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5 SP2" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to send requests that appear to come from the localhost which could expose the product\u0027s admin interface to users who would not normally have access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication Bypass" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000283077", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000283077" }, { "name": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/", "refsource": "MISC", "url": "https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-trend-micro-interscan-web-security-virtual-appliance/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-8464", "datePublished": "2020-12-17T21:05:46", "dateReserved": "2020-01-30T00:00:00", "dateUpdated": "2024-08-04T10:03:44.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }