Vulnerabilities > Trendmicro
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-03-15 | CVE-2018-6222 | OS Command Injection vulnerability in Trendmicro Email Encryption Gateway 5.5 Arbitrary logs location in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to change location of log files and be manipulated to execute arbitrary commands and attain command execution on a vulnerable system. | 7.8 |
2018-03-15 | CVE-2018-6221 | Improper Certificate Validation vulnerability in Trendmicro Email Encryption Gateway 5.5 An unvalidated software update vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow a man-in-the-middle attacker to tamper with an update file and inject their own. | 8.1 |
2018-03-15 | CVE-2018-6220 | Injection vulnerability in Trendmicro Email Encryption Gateway 5.5 An arbitrary file write vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to inject arbitrary data, which may lead to gaining code execution on vulnerable systems. | 9.8 |
2018-03-15 | CVE-2018-6219 | Improper Certificate Validation vulnerability in Trendmicro Email Encryption Gateway 5.5 An Insecure Update via HTTP vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to eavesdrop and tamper with certain types of update data. | 6.5 |
2018-02-16 | CVE-2018-6218 | Untrusted Search Path vulnerability in Trendmicro products A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an attacker to run arbitrary code on a vulnerable system. | 7.0 |
2018-02-16 | CVE-2018-3609 | Information Exposure Through Log Files vulnerability in Trendmicro Interscan Messaging Security Virtual Appliance 9.0/9.1 A vulnerability in the Trend Micro InterScan Messaging Security Virtual Appliance 9.0 and 9.1 management portal could allow an unauthenticated user to access sensitive information in a particular log file that could be used to bypass authentication on vulnerable installations. | 8.1 |
2018-02-09 | CVE-2018-3607 | SQL Injection vulnerability in Trendmicro Control Manager 6.0 XXXTreeNode method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. | 8.8 |
2018-02-09 | CVE-2018-3606 | SQL Injection vulnerability in Trendmicro Control Manager 6.0 XXXStatusXXX, XXXSummary, TemplateXXX and XXXCompliance method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. | 8.8 |
2018-02-09 | CVE-2018-3605 | SQL Injection vulnerability in Trendmicro Control Manager 6.0 TopXXX, ViolationXXX, and IncidentXXX method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. | 8.8 |
2018-02-09 | CVE-2018-3604 | SQL Injection vulnerability in Trendmicro Control Manager 6.0 GetXXX method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. | 8.8 |