Filtered by vendor Trendmicro
Subscriptions
Filtered by product Threat Discovery Appliance
Subscriptions
Total
12 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2016-8593 | 1 Trendmicro | 1 Threat Discovery Appliance | 2024-11-21 | N/A |
Directory traversal vulnerability in upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via a .. (dot dot) in the dID parameter. | ||||
CVE-2016-8592 | 1 Trendmicro | 1 Threat Discovery Appliance | 2024-11-21 | N/A |
log_query_system.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter. | ||||
CVE-2016-8591 | 1 Trendmicro | 1 Threat Discovery Appliance | 2024-11-21 | N/A |
log_query.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter. | ||||
CVE-2016-8590 | 1 Trendmicro | 1 Threat Discovery Appliance | 2024-11-21 | N/A |
log_query_dlp.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter. | ||||
CVE-2016-8589 | 1 Trendmicro | 1 Threat Discovery Appliance | 2024-11-21 | N/A |
log_query_dae.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter. | ||||
CVE-2016-8588 | 1 Trendmicro | 1 Threat Discovery Appliance | 2024-11-21 | N/A |
The hotfix_upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via shell metacharacters in the file name of an uploaded file. | ||||
CVE-2016-8587 | 1 Trendmicro | 1 Threat Discovery Appliance | 2024-11-21 | N/A |
dlp_policy_upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via an archive file containing a symlink to /eng_ptn_stores/prod/sensorSDK/data/ or /eng_ptn_stores/prod/sensorSDK/backup_pol/. | ||||
CVE-2016-8586 | 1 Trendmicro | 1 Threat Discovery Appliance | 2024-11-21 | N/A |
detected_potential_files.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter. | ||||
CVE-2016-8585 | 1 Trendmicro | 1 Threat Discovery Appliance | 2024-11-21 | N/A |
admin_sys_time.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the timezone parameter. | ||||
CVE-2016-8584 | 1 Trendmicro | 1 Threat Discovery Appliance | 2024-11-21 | N/A |
Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier uses predictable session values, which allows remote attackers to bypass authentication by guessing the value. | ||||
CVE-2016-7552 | 1 Trendmicro | 1 Threat Discovery Appliance | 2024-11-21 | N/A |
On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS. | ||||
CVE-2016-7547 | 1 Trendmicro | 1 Threat Discovery Appliance | 2024-11-21 | N/A |
A command execution flaw on the Trend Micro Threat Discovery Appliance 2.6.1062r1 exists with the timezone parameter in the admin_sys_time.cgi interface. |
Page 1 of 1.