Логотип exploitDog
bind:CVE-2019-18187
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-18187

Количество 3

Количество 3

nvd логотип

CVE-2019-18187

больше 6 лет назад

Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication.

CVSS3: 7.5
EPSS: Высокий
github логотип

GHSA-cjq6-9jh6-x2vg

больше 3 лет назад

Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication.

CVSS3: 7.5
EPSS: Высокий
fstec логотип

BDU:2021-02945

больше 6 лет назад

Уязвимость средства антивирусной защиты Trend Micro OfficeScan, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.7
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-18187

Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication.

CVSS3: 7.5
78%
Высокий
больше 6 лет назад
github логотип
GHSA-cjq6-9jh6-x2vg

Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication.

CVSS3: 7.5
78%
Высокий
больше 3 лет назад
fstec логотип
BDU:2021-02945

Уязвимость средства антивирусной защиты Trend Micro OfficeScan, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.7
78%
Высокий
больше 6 лет назад

Уязвимостей на страницу