Описание
detected_potential_files.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 2.6.1062 (включая)
cpe:2.3:a:trendmicro:threat_discovery_appliance:*:r1:*:*:*:*:*:*
EPSS
Процентиль: 87%
0.03537
Низкий
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-264
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
detected_potential_files.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the cache_id parameter.
EPSS
Процентиль: 87%
0.03537
Низкий
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-264