Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
discovery vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2016-8584
Trend Micro Threat Discovery Appliance 2.6.1062r1 and previous versions uses predictable session values, which allows remote malicious users to bypass authentication by guessing the value.
Trendmicro Threat Discovery Appliance
2 Github repositories
8.8
CVSSv3
CVE-2016-8586
detected_potential_files.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and previous versions allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
Trendmicro Threat Discovery Appliance
8.8
CVSSv3
CVE-2016-8589
log_query_dae.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and previous versions allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
Trendmicro Threat Discovery Appliance
8.8
CVSSv3
CVE-2016-8590
log_query_dlp.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and previous versions allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
Trendmicro Threat Discovery Appliance
8.8
CVSSv3
CVE-2016-8592
log_query_system.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and previous versions allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
Trendmicro Threat Discovery Appliance
6.7
CVSSv3
CVE-2019-11093
Unquoted service path in the installer for the Intel(R) SCS Discovery Utility version 12.0.0.129 and previous versions may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel Scs Discovery Utility
8.8
CVSSv3
CVE-2016-8585
admin_sys_time.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and previous versions allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the timezone parameter.
Trendmicro Threat Discovery Appliance
7.3
CVSSv3
CVE-2016-8588
The hotfix_upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and previous versions allows remote authenticated users to execute arbitrary code via shell metacharacters in the file name of an uploaded file.
Trendmicro Threat Discovery Appliance
8.8
CVSSv3
CVE-2016-8591
log_query.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and previous versions allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
Trendmicro Threat Discovery Appliance
9.8
CVSSv3
CVE-2017-11380
Backup archives were found to be encrypted with a static password across different installations, which suggest the same password may be used in all virtual appliance instances of Trend Micro Deep Discovery Director 1.1.
Trendmicro Deep Discovery Director 1.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »