Page 5 of 28 results (0.005 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 before CP 1746 mismanages certain key and certificate data. Per IWSVA documentation, by default, IWSVA acts as a private Certificate Authority (CA) and dynamically generates digital certificates that are sent to client browsers to complete a secure passage for HTTPS connections. It also allows administrators to upload their own certificates signed by a root CA. An attacker with low privileges can download the current CA certificate and Private Key (either the default ones or ones uploaded by administrators) and use those to decrypt HTTPS traffic, thus compromising confidentiality. Also, the default Private Key on this appliance is encrypted with a very weak passphrase. • https://www.exploit-db.com/exploits/42013 http://www.securityfocus.com/bid/97492 https://success.trendmicro.com/solution/1116960 https://www.qualys.com/2017/01/12/qsa-2017-01-12/qsa-2017-01-12.pdf • CWE-269: Improper Privilege Management CWE-521: Weak Password Requirements •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

Multiple Access Control issues in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 before CP 1746 allow an authenticated, remote user with low privileges like 'Reports Only' or 'Auditor' to change FTP Access Control Settings, create or modify reports, or upload an HTTPS Decryption Certificate and Private Key. Múltiples problemas de control de acceso en Trend Micro InterScan Web Security Virtual Appliance 6.5 en versiones anteriores a CP 1746 permiten a un usuario remoto autenticado con privilegios bajos como 'Reports Only' o 'Auditor' cambiar la configuración del control de acceso FTP, crear o modificar informes o cargar un certificado de descifrado HTTPS y clave privada. Trend Micro Interscan Web Security Virtual Appliance (IWSVA) version 6.5 SP2 suffers from faulty access controls, stored cross site scripting, and information disclosure vulnerabilities • https://www.exploit-db.com/exploits/42013 http://www.securityfocus.com/bid/97482 https://success.trendmicro.com/solution/1116960 https://www.qualys.com/2017/01/12/qsa-2017-01-12/qsa-2017-01-12.pdf • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Sensitive Information Disclosure in com.trend.iwss.gui.servlet.ConfigBackup in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, remote users with least privileges to backup the system configuration and download it onto their local machine. This backup file contains sensitive information like passwd/shadow files, RSA certificates, Private Keys and Default Passphrase, etc. This was resolved in Version 6.5 CP 1737. Divulgación de información sensible en com.trend.iwss.gui.servlet.ConfigBackup en Trend Micro InterScan Web Security Virtual Appliance (IWSVA) versión 6.5-SP2_Build_Linux_1707 y versiones anteriores permite a usuarios remotos autenticados con menos privilegios hacer una copia de seguridad de la configuración del sistema y descargarla en su máquina local. Esta copia de seguridad contiene información sensible como archivos passwd/shadow, certificados RSA, claves privadas y frases de contraseñas por defecto, etc. • https://www.exploit-db.com/exploits/41361 http://www.securityfocus.com/bid/96252 http://www.securitytracker.com/id/1037849 https://success.trendmicro.com/solution/1116672 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

Multiple stored Cross-Site-Scripting (XSS) vulnerabilities in com.trend.iwss.gui.servlet.updateaccountadministration in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allow authenticated, remote users with least privileges to inject arbitrary HTML/JavaScript code into web pages. This was resolved in Version 6.5 CP 1737. Múltiples vulnerabilidades de XSS almacenadas en com.trend.iwss.gui.servlet.updateaccountadministration en Trend Micro InterScan Web Security Virtual Appliance (IWSVA) versión 6.5-SP2_Build_Linux_1707 y versiones anteriores permite a usuarios remotos autenticados con menos privilegios inyectar código HTML/JavaScript arbitrario en páginas web. Esto se resolvió en Versión 6.5 CP 1737. • https://www.exploit-db.com/exploits/41361 http://www.securityfocus.com/bid/96252 http://www.securitytracker.com/id/1037849 https://success.trendmicro.com/solution/1116672 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 1

Remote Command Execution in com.trend.iwss.gui.servlet.ManagePatches in Trend Micro Interscan Web Security Virtual Appliance (IWSVA) version 6.5-SP2_Build_Linux_1707 and earlier allows authenticated, remote users with least privileges to run arbitrary commands on the system as root via Patch Update functionality. This was resolved in Version 6.5 CP 1737. Ejecución de comandos remota en com.trend.iwss.gui.servlet.ManagePatches en Trend Micro Interscan Web Security Virtual Appliance (IWSVA) versión 6.5-SP2_Build_Linux_1707 y versiones anteriores permite a usuarios remotos autenticados con menos privilegios ejecutar comandos arbitrarios en el sistema como root a través de la funcionalidad Patch Update. Esto se resolvió en la Versión 6.5 CP 1737. • https://www.exploit-db.com/exploits/41361 http://www.securityfocus.com/bid/96252 http://www.securitytracker.com/id/1037849 https://success.trendmicro.com/solution/1116672 • CWE-264: Permissions, Privileges, and Access Controls •