Trendmicro

Threat Discovery Appliance

12 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 4.08%
  • Published 28.04.2017 19:59:00
  • Last modified 20.04.2025 01:37:25

Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier uses predictable session values, which allows remote attackers to bypass authentication by guessing the value.

Exploit
  • EPSS 9.54%
  • Published 28.04.2017 19:59:00
  • Last modified 20.04.2025 01:37:25

admin_sys_time.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the timezone parameter.

Exploit
  • EPSS 3.54%
  • Published 28.04.2017 19:59:00
  • Last modified 20.04.2025 01:37:25

detected_potential_files.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.

Exploit
  • EPSS 0.56%
  • Published 28.04.2017 19:59:00
  • Last modified 20.04.2025 01:37:25

dlp_policy_upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via an archive file containing a symlink to /eng_ptn_stores/prod/sensorSDK/data/ or /eng_ptn_stores/pro...

Exploit
  • EPSS 0.56%
  • Published 28.04.2017 19:59:00
  • Last modified 20.04.2025 01:37:25

The hotfix_upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via shell metacharacters in the file name of an uploaded file.

Exploit
  • EPSS 3.54%
  • Published 28.04.2017 19:59:00
  • Last modified 20.04.2025 01:37:25

log_query_dae.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.

Exploit
  • EPSS 3.54%
  • Published 28.04.2017 19:59:00
  • Last modified 20.04.2025 01:37:25

log_query_dlp.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.

Exploit
  • EPSS 3.54%
  • Published 28.04.2017 19:59:00
  • Last modified 20.04.2025 01:37:25

log_query.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.

Exploit
  • EPSS 3.54%
  • Published 28.04.2017 19:59:00
  • Last modified 20.04.2025 01:37:25

log_query_system.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.

Exploit
  • EPSS 4.89%
  • Published 28.04.2017 19:59:00
  • Last modified 20.04.2025 01:37:25

Directory traversal vulnerability in upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via a .. (dot dot) in the dID parameter.