Vulnerabilites related to Trend Micro - InterScan Web Security Virtual Appliance
CVE-2019-9490 (GCVE-0-2019-9490)
Vulnerability from cvelistv5
Published
2019-04-05 22:46
Modified
2024-08-04 21:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Admin Credential Disclosure
Summary
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance version 6.5 SP2 could allow an non-authorized user to disclose administrative credentials. An attacker must be an authenticated user in order to exploit the vulnerability.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | InterScan Web Security Virtual Appliance |
Version: 6.5 SP2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:54:44.101Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://success.trendmicro.com/solution/1122326" }, { "name": "107848", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107848" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5 SP2" } ] } ], "datePublic": "2019-04-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance version 6.5 SP2 could allow an non-authorized user to disclose administrative credentials. An attacker must be an authenticated user in order to exploit the vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Admin Credential Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-10T15:06:15", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://success.trendmicro.com/solution/1122326" }, { "name": "107848", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107848" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2019-9490", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5 SP2" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance version 6.5 SP2 could allow an non-authorized user to disclose administrative credentials. An attacker must be an authenticated user in order to exploit the vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Admin Credential Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/1122326", "refsource": "CONFIRM", "url": "https://success.trendmicro.com/solution/1122326" }, { "name": "107848", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107848" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2019-9490", "datePublished": "2019-04-05T22:46:11", "dateReserved": "2019-03-01T00:00:00", "dateUpdated": "2024-08-04T21:54:44.101Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-11396 (GCVE-0-2017-11396)
Vulnerability from cvelistv5
Published
2017-09-22 16:00
Modified
2024-09-16 17:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Other (Input Parameter Inspection)
Summary
Vulnerability issues with the web service inspection of input parameters in Trend Micro Web Security Virtual Appliance 6.5 may allow potential attackers who already have administration rights to the console to implement remote code injections.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | InterScan Web Security Virtual Appliance |
Version: 6.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:05:30.667Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://success.trendmicro.com/solution/1117412" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "InterScan Web Security Virtual Appliance", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "6.5" } ] } ], "datePublic": "2017-05-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability issues with the web service inspection of input parameters in Trend Micro Web Security Virtual Appliance 6.5 may allow potential attackers who already have administration rights to the console to implement remote code injections." } ], "problemTypes": [ { "descriptions": [ { "description": "Other (Input Parameter Inspection)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-22T15:57:01", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://success.trendmicro.com/solution/1117412" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "DATE_PUBLIC": "2017-05-22T00:00:00", "ID": "CVE-2017-11396", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "InterScan Web Security Virtual Appliance", "version": { "version_data": [ { "version_value": "6.5" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability issues with the web service inspection of input parameters in Trend Micro Web Security Virtual Appliance 6.5 may allow potential attackers who already have administration rights to the console to implement remote code injections." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Other (Input Parameter Inspection)" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/1117412", "refsource": "CONFIRM", "url": "https://success.trendmicro.com/solution/1117412" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2017-11396", "datePublished": "2017-09-22T16:00:00Z", "dateReserved": "2017-07-17T00:00:00", "dateUpdated": "2024-09-16T17:04:05.359Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }