Lucene search

K
TrendmicroInterscan Web Security Virtual Appliance

29 matches found

CVE
CVE
added 2020/05/27 11:15 p.m.150 views

CVE-2020-8604

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to disclose sensitive informatoin on affected installations.

7.5CVSS7.7AI score0.86644EPSS
CVE
CVE
added 2020/05/27 11:15 p.m.142 views

CVE-2020-8605

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability.

8.8CVSS9.2AI score0.89563EPSS
CVE
CVE
added 2020/05/27 11:15 p.m.137 views

CVE-2020-8606

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to bypass authentication on affected installations of Trend Micro InterScan Web Security Virtual Appliance.

9.8CVSS9.5AI score0.88833EPSS
CVE
CVE
added 2017/04/05 4:59 p.m.84 views

CVE-2017-6339

Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 before CP 1746 mismanages certain key and certificate data. Per IWSVA documentation, by default, IWSVA acts as a private Certificate Authority (CA) and dynamically generates digital certificates that are sent to client browsers to com...

6.5CVSS6.4AI score0.02677EPSS
CVE
CVE
added 2020/11/18 7:15 p.m.63 views

CVE-2020-28578

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an unauthenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges.

9.8CVSS9.7AI score0.58536EPSS
CVE
CVE
added 2017/04/05 4:59 p.m.58 views

CVE-2017-6338

Multiple Access Control issues in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 before CP 1746 allow an authenticated, remote user with low privileges like 'Reports Only' or 'Auditor' to change FTP Access Control Settings, create or modify reports, or upload an HTTPS Decryption C...

6.5CVSS6.5AI score0.01013EPSS
CVE
CVE
added 2017/02/21 7:59 a.m.55 views

CVE-2016-9315

Privilege Escalation Vulnerability in com.trend.iwss.gui.servlet.updateaccountadministration in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, remote users with least privileges to change Master Admin's password and/or...

8.8CVSS9.1AI score0.05864EPSS
CVE
CVE
added 2017/04/05 4:59 p.m.54 views

CVE-2017-6340

Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 before CP 1746 does not sanitize a rest/commonlog/report/template name field, which allows a 'Reports Only' user to inject malicious JavaScript while creating a new report. Additionally, IWSVA implements incorrect access control that ...

5.4CVSS5.7AI score0.00195EPSS
CVE
CVE
added 2020/12/17 9:15 p.m.52 views

CVE-2020-8463

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to bypass a global authorization check for anonymous users by manipulating request paths.

7.5CVSS7.5AI score0.00561EPSS
CVE
CVE
added 2024/06/10 10:15 p.m.50 views

CVE-2024-36359

A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 could allow an attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in orde...

5.4CVSS6.1AI score0.00138EPSS
CVE
CVE
added 2021/03/03 4:15 p.m.46 views

CVE-2021-25252

Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.

5.5CVSS5.4AI score0.00063EPSS
CVE
CVE
added 2017/02/21 7:59 a.m.45 views

CVE-2016-9314

Sensitive Information Disclosure in com.trend.iwss.gui.servlet.ConfigBackup in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, remote users with least privileges to backup the system configuration and download it onto t...

7.8CVSS8.1AI score0.01484EPSS
CVE
CVE
added 2017/02/21 7:59 a.m.43 views

CVE-2016-9269

Remote Command Execution in com.trend.iwss.gui.servlet.ManagePatches in Trend Micro Interscan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, remote users with least privileges to run arbitrary commands on the system as root via Patch Update...

9.9CVSS9.7AI score0.06848EPSS
CVE
CVE
added 2020/12/17 9:15 p.m.41 views

CVE-2020-8466

A command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2, with the improved password hashing method enabled, could allow an unauthenticated attacker to execute certain commands by providing a manipulated password.

9.8CVSS9.8AI score0.27274EPSS
CVE
CVE
added 2020/12/17 9:15 p.m.40 views

CVE-2020-8461

A CSRF protection bypass vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to get a victim's browser to send a specifically encoded request without requiring a valid CSRF token.

8.8CVSS9AI score0.00231EPSS
CVE
CVE
added 2017/02/21 7:59 a.m.39 views

CVE-2016-9316

Multiple stored Cross-Site-Scripting (XSS) vulnerabilities in com.trend.iwss.gui.servlet.updateaccountadministration in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allow authenticated, remote users with least privileges to inject arbitra...

5.4CVSS7.3AI score0.0056EPSS
CVE
CVE
added 2020/11/18 7:15 p.m.39 views

CVE-2020-28579

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges.

8.8CVSS9.2AI score0.39085EPSS
CVE
CVE
added 2019/04/05 11:29 p.m.38 views

CVE-2019-9490

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance version 6.5 SP2 could allow an non-authorized user to disclose administrative credentials. An attacker must be an authenticated user in order to exploit the vulnerability.

8.8CVSS8.4AI score0.00696EPSS
CVE
CVE
added 2020/11/18 7:15 p.m.38 views

CVE-2020-28581

A command injection vulnerability in ModifyVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges.

9CVSS7.4AI score0.75374EPSS
CVE
CVE
added 2017/09/22 4:29 p.m.37 views

CVE-2017-11396

Vulnerability issues with the web service inspection of input parameters in Trend Micro Web Security Virtual Appliance 6.5 may allow potential attackers who already have administration rights to the console to implement remote code injections.

9CVSS7.2AI score0.0088EPSS
CVE
CVE
added 2020/12/17 9:15 p.m.33 views

CVE-2020-27010

A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product in a manner separate from the similar CVE-2020-8462.

4.8CVSS4.8AI score0.0047EPSS
CVE
CVE
added 2020/05/27 11:15 p.m.33 views

CVE-2020-8603

A cross-site scripting vulnerability (XSS) in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow a remote attacker to tamper with the web interface of affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or...

6.1CVSS5.9AI score0.00391EPSS
CVE
CVE
added 2020/11/18 7:15 p.m.31 views

CVE-2020-28580

A command injection vulnerability in AddVLANItem of Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send specially crafted HTTP messages and execute arbitrary OS commands with elevated privileges.

9CVSS7.4AI score0.75374EPSS
CVE
CVE
added 2009/02/17 5:30 p.m.30 views

CVE-2009-0612

Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 3.x and InterScan Web Security Suite (IWSS) 3.x, when basic authorization is enabled on the standalone proxy, forwards the Proxy-Authorization header from Windows Media Player, which allows remote web servers to obtain credentials by offe...

4.3CVSS6.8AI score0.0068EPSS
CVE
CVE
added 2020/12/17 9:15 p.m.30 views

CVE-2020-8465

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to manipulate system updates using a combination of CSRF bypass (CVE-2020-8461) and authentication bypass (CVE-2020-8464) to execute code as user root.

10CVSS8.3AI score0.00644EPSS
CVE
CVE
added 2020/12/17 9:15 p.m.28 views

CVE-2020-8462

A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product.

4.8CVSS4.8AI score0.0047EPSS
CVE
CVE
added 2020/12/17 9:15 p.m.28 views

CVE-2020-8464

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to send requests that appear to come from the localhost which could expose the product's admin interface to users who would not normally have access.

7.5CVSS8.4AI score0.00644EPSS
CVE
CVE
added 2021/06/17 12:15 p.m.27 views

CVE-2021-31521

Trend Micro InterScan Web Security Virtual Appliance version 6.5 was found to have a reflected cross-site scripting (XSS) vulnerability in the product's Captive Portal.

5.4CVSS5.3AI score0.00405EPSS
CVE
CVE
added 2014/11/07 7:55 p.m.26 views

CVE-2014-8510

The AdminUI in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) before 6.0 HF build 1244 allows remote authenticated users to read arbitrary files via vectors related to configuration input when saving filters.

4CVSS6.3AI score0.00236EPSS