Lucene search

K
TrendmicroInterscan Web Security Virtual Appliance

5 matches found

CVE
CVE
added 2020/05/27 11:15 p.m.142 views

CVE-2020-8605

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability.

8.8CVSS9.2AI score0.89563EPSS
CVE
CVE
added 2017/02/21 7:59 a.m.55 views

CVE-2016-9315

Privilege Escalation Vulnerability in com.trend.iwss.gui.servlet.updateaccountadministration in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, remote users with least privileges to change Master Admin's password and/or...

8.8CVSS9.1AI score0.05864EPSS
CVE
CVE
added 2020/12/17 9:15 p.m.40 views

CVE-2020-8461

A CSRF protection bypass vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to get a victim's browser to send a specifically encoded request without requiring a valid CSRF token.

8.8CVSS9AI score0.00231EPSS
CVE
CVE
added 2020/11/18 7:15 p.m.39 views

CVE-2020-28579

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges.

8.8CVSS9.2AI score0.39085EPSS
CVE
CVE
added 2019/04/05 11:29 p.m.38 views

CVE-2019-9490

A vulnerability in Trend Micro InterScan Web Security Virtual Appliance version 6.5 SP2 could allow an non-authorized user to disclose administrative credentials. An attacker must be an authenticated user in order to exploit the vulnerability.

8.8CVSS8.4AI score0.00696EPSS