Search criteria
4 vulnerabilities found for Worry-Free Business Security by Trend Micro
CERTFR-2025-AVI-0544
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Trend Micro. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une injection SQL (SQLi).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Trend Micro | Worry-Free Business Security | Worry-Free Business Security Services versions antérieures à 6.7.3954 et 14.3.1299 | ||
| Trend Micro | Apex One | Security agent pour Apex One as a Service versions antérieures à 14.0.14492 | ||
| Trend Micro | Apex Central | Apex Central versions antérieures à CP B7007 | ||
| Trend Micro | Apex Central | Apex Central as a Service sans le correctif de sécurité d'Avril 2025 | ||
| Trend Micro | Apex One | Apex One versions antérieures à SP1 CP Build 14002 | ||
| Trend Micro | Trend Micro Endpoint Encryption | Trend Micro Endpoint Encryption PolicyServer sans correctif de sécurité Patch 1 Update 6 (Version 6.0.0.4013) | ||
| Trend Micro | Worry-Free Business Security | Worry-Free Business Security versions antérieures à 10 SP1 Patch 2514 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Worry-Free Business Security Services versions ant\u00e9rieures \u00e0 6.7.3954 et 14.3.1299",
"product": {
"name": "Worry-Free Business Security",
"vendor": {
"name": "Trend Micro",
"scada": false
}
}
},
{
"description": "Security agent pour Apex One as a Service versions ant\u00e9rieures \u00e0 14.0.14492",
"product": {
"name": "Apex One",
"vendor": {
"name": "Trend Micro",
"scada": false
}
}
},
{
"description": "Apex Central versions ant\u00e9rieures \u00e0 CP B7007",
"product": {
"name": "Apex Central",
"vendor": {
"name": "Trend Micro",
"scada": false
}
}
},
{
"description": "Apex Central as a Service sans le correctif de s\u00e9curit\u00e9 d\u0027Avril 2025",
"product": {
"name": "Apex Central",
"vendor": {
"name": "Trend Micro",
"scada": false
}
}
},
{
"description": "Apex One versions ant\u00e9rieures \u00e0 SP1 CP Build 14002",
"product": {
"name": "Apex One",
"vendor": {
"name": "Trend Micro",
"scada": false
}
}
},
{
"description": "Trend Micro Endpoint Encryption PolicyServer sans correctif de s\u00e9curit\u00e9 Patch 1 Update 6 (Version 6.0.0.4013)",
"product": {
"name": "Trend Micro Endpoint Encryption",
"vendor": {
"name": "Trend Micro",
"scada": false
}
}
},
{
"description": "Worry-Free Business Security versions ant\u00e9rieures \u00e0 10 SP1 Patch 2514",
"product": {
"name": "Worry-Free Business Security",
"vendor": {
"name": "Trend Micro",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49220"
},
{
"name": "CVE-2025-49219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49219"
},
{
"name": "CVE-2025-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49156"
},
{
"name": "CVE-2025-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49155"
},
{
"name": "CVE-2025-49215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49215"
},
{
"name": "CVE-2025-49214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49214"
},
{
"name": "CVE-2025-49212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49212"
},
{
"name": "CVE-2025-49157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49157"
},
{
"name": "CVE-2025-49487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49487"
},
{
"name": "CVE-2025-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49216"
},
{
"name": "CVE-2025-49217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49217"
},
{
"name": "CVE-2025-49213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49213"
},
{
"name": "CVE-2025-49158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49158"
},
{
"name": "CVE-2025-49211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49211"
},
{
"name": "CVE-2025-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49154"
},
{
"name": "CVE-2025-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49218"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0544",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Trend Micro. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une injection SQL (SQLi).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Trend Micro",
"vendor_advisories": [
{
"published_at": "2025-06-09",
"title": "Bulletin de s\u00e9curit\u00e9 Trend Micro KA-0019936",
"url": "https://success.trendmicro.com/en-US/solution/KA-0019936"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Trend Micro KA-0019926",
"url": "https://success.trendmicro.com/en-US/solution/KA-0019926"
},
{
"published_at": "2025-06-10",
"title": "Bulletin de s\u00e9curit\u00e9 Trend Micro KA-0019928",
"url": "https://success.trendmicro.com/en-US/solution/KA-0019928"
},
{
"published_at": "2025-06-09",
"title": "Bulletin de s\u00e9curit\u00e9 Trend Micro KA-0019917",
"url": "https://success.trendmicro.com/en-US/solution/KA-0019917"
}
]
}
VAR-201802-0931
Vulnerability from variot - Updated: 2023-12-18 13:19A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an attacker to run arbitrary code on a vulnerable system. Multiple products provided by Trend Micro Incorporated contain an insecure DLL loading issue (CWE-427). When invoking the installers of other applications while the concerned products are installed to the PC, the DLL placed in the same directory as the the installers (of the other applications) may be insecurely loaded. Hidenori Ohta of Mitsubishi Electric Information Systems Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Arbitrary code may be executed with the privilege of the user invoking the installer of other applications. A remote attacker can leverage this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in a denial of service condition
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201802-0931",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "endpoint sensor",
"scope": "eq",
"trust": 1.7,
"vendor": "trend micro",
"version": "1.6"
},
{
"model": "deep security",
"scope": "eq",
"trust": 1.7,
"vendor": "trend micro",
"version": "10.0"
},
{
"model": "worry-free business security",
"scope": "eq",
"trust": 1.0,
"vendor": "trendmicro",
"version": "9.5"
},
{
"model": "security",
"scope": "eq",
"trust": 1.0,
"vendor": "trendmicro",
"version": "12.0"
},
{
"model": "officescan",
"scope": "eq",
"trust": 1.0,
"vendor": "trendmicro",
"version": "12.0"
},
{
"model": "deep security",
"scope": "eq",
"trust": 1.0,
"vendor": "trendmicro",
"version": "10.1"
},
{
"model": "officescan",
"scope": "eq",
"trust": 1.0,
"vendor": "trendmicro",
"version": "11.0"
},
{
"model": "endpoint sensor",
"scope": "eq",
"trust": 1.0,
"vendor": "trendmicro",
"version": "1.6"
},
{
"model": "deep security",
"scope": "eq",
"trust": 1.0,
"vendor": "trendmicro",
"version": "10.0"
},
{
"model": "worry-free business security",
"scope": "eq",
"trust": 0.9,
"vendor": "trend micro",
"version": "9.5"
},
{
"model": "officescan",
"scope": "eq",
"trust": 0.9,
"vendor": "trend micro",
"version": "11.0"
},
{
"model": "deep security",
"scope": "eq",
"trust": 0.9,
"vendor": "trend micro",
"version": "10.1"
},
{
"model": "officescan",
"scope": "eq",
"trust": 0.8,
"vendor": "trend micro",
"version": "version 11.0"
},
{
"model": "officescan",
"scope": "eq",
"trust": 0.8,
"vendor": "trend micro",
"version": "xg (version 12)"
},
{
"model": "deep security",
"scope": "eq",
"trust": 0.8,
"vendor": "trend micro",
"version": "10.1 (feature release)"
},
{
"model": "security",
"scope": "eq",
"trust": 0.8,
"vendor": "trend micro",
"version": "(consumer) all 2018 (v12) versions"
},
{
"model": "worry-free business security",
"scope": "eq",
"trust": 0.8,
"vendor": "trend micro",
"version": "version 9.5 (standard/advanced)"
},
{
"model": "worry-free business security services",
"scope": null,
"trust": 0.8,
"vendor": "trend micro",
"version": null
},
{
"model": "security",
"scope": "eq",
"trust": 0.6,
"vendor": "trend micro",
"version": "12"
},
{
"model": "officescan",
"scope": "eq",
"trust": 0.6,
"vendor": "trend micro",
"version": "12"
},
{
"model": "officescan",
"scope": "eq",
"trust": 0.6,
"vendor": "trend micro",
"version": "12.0"
},
{
"model": "premium security",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "12.0"
},
{
"model": "officescan business security",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "9.5"
},
{
"model": "officescan xg",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "11"
},
{
"model": "officescan xg",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "(12.0)"
},
{
"model": "maximum security",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "12.0"
},
{
"model": "internet security",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "12.0"
},
{
"model": "antivirus+ security",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "12.0"
},
{
"model": "worry-free business security patch",
"scope": "ne",
"trust": 0.3,
"vendor": "trend micro",
"version": "9.51"
},
{
"model": "officescan business security patch (build",
"scope": "ne",
"trust": 0.3,
"vendor": "trend micro",
"version": "9.511"
},
{
"model": "endpoint sensor update (cp",
"scope": "ne",
"trust": 0.3,
"vendor": "trend micro",
"version": "1.63310"
},
{
"model": "deep security",
"scope": "ne",
"trust": 0.3,
"vendor": "trend micro",
"version": "10.2"
},
{
"model": "deep security 10.0 u5 cp",
"scope": "ne",
"trust": 0.3,
"vendor": "trend micro",
"version": null
}
],
"sources": [
{
"db": "BID",
"id": "103096"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-000013"
},
{
"db": "NVD",
"id": "CVE-2018-6218"
},
{
"db": "CNNVD",
"id": "CNNVD-201802-873"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:trendmicro:deep_security:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:trendmicro:deep_security:10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:trendmicro:endpoint_sensor:1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:trendmicro:officescan:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:trendmicro:officescan:12.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:trendmicro:security:12.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:trendmicro:worry-free_business_security:9.5:*:*:*:advanced:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:trendmicro:worry-free_business_security:9.5:*:*:*:standard:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-6218"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Hidenori Ohta of Mitsubishi Electric Information Systems Corporation.",
"sources": [
{
"db": "BID",
"id": "103096"
}
],
"trust": 0.3
},
"cve": "CVE-2018-6218",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2018-000013",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 4.9,
"id": "VHN-136250",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.0,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "IPA",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2018-000013",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-6218",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2018-000013",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201802-873",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-136250",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-136250"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-000013"
},
{
"db": "NVD",
"id": "CVE-2018-6218"
},
{
"db": "CNNVD",
"id": "CNNVD-201802-873"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A DLL Hijacking vulnerability in Trend Micro\u0027s User-Mode Hooking Module (UMH) could allow an attacker to run arbitrary code on a vulnerable system. Multiple products provided by Trend Micro Incorporated contain an insecure DLL loading issue (CWE-427). When invoking the installers of other applications while the concerned products are installed to the PC, the DLL placed in the same directory as the the installers (of the other applications) may be insecurely loaded. Hidenori Ohta of Mitsubishi Electric Information Systems Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Arbitrary code may be executed with the privilege of the user invoking the installer of other applications. \nA remote attacker can leverage this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in a denial of service condition",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-6218"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-000013"
},
{
"db": "BID",
"id": "103096"
},
{
"db": "VULHUB",
"id": "VHN-136250"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-6218",
"trust": 2.8
},
{
"db": "JVN",
"id": "JVN28865183",
"trust": 2.8
},
{
"db": "BID",
"id": "103096",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2018-000013",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201802-873",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-136250",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-136250"
},
{
"db": "BID",
"id": "103096"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-000013"
},
{
"db": "NVD",
"id": "CVE-2018-6218"
},
{
"db": "CNNVD",
"id": "CNNVD-201802-873"
}
]
},
"id": "VAR-201802-0931",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-136250"
}
],
"trust": 0.22407407000000001
},
"last_update_date": "2023-12-18T13:19:15.396000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Solution Id: 1119326",
"trust": 0.8,
"url": "https://success.trendmicro.com/solution/1119326"
},
{
"title": "Trend Micro\u0027s User-Mode Hooking Module Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159149"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-000013"
},
{
"db": "CNNVD",
"id": "CNNVD-201802-873"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-426",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-136250"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-000013"
},
{
"db": "NVD",
"id": "CVE-2018-6218"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://success.trendmicro.com/solution/1119326"
},
{
"trust": 2.0,
"url": "https://jvn.jp/jp/jvn28865183/"
},
{
"trust": 2.0,
"url": "https://success.trendmicro.com/jp/solution/1119348"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/103096"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-6218"
},
{
"trust": 0.8,
"url": "https://www.ipa.go.jp/security/ciadr/vul/20180215-jvn.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/en/jp/jvn28865183/index.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/en/ta/jvnta91240916/index.html"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-6218"
},
{
"trust": 0.3,
"url": "http://www.trend.com"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-136250"
},
{
"db": "BID",
"id": "103096"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-000013"
},
{
"db": "NVD",
"id": "CVE-2018-6218"
},
{
"db": "CNNVD",
"id": "CNNVD-201802-873"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-136250"
},
{
"db": "BID",
"id": "103096"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-000013"
},
{
"db": "NVD",
"id": "CVE-2018-6218"
},
{
"db": "CNNVD",
"id": "CNNVD-201802-873"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-02-16T00:00:00",
"db": "VULHUB",
"id": "VHN-136250"
},
{
"date": "2018-02-14T00:00:00",
"db": "BID",
"id": "103096"
},
{
"date": "2018-02-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-000013"
},
{
"date": "2018-02-16T22:29:00.413000",
"db": "NVD",
"id": "CVE-2018-6218"
},
{
"date": "2018-02-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201802-873"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-08-30T00:00:00",
"db": "VULHUB",
"id": "VHN-136250"
},
{
"date": "2018-02-14T00:00:00",
"db": "BID",
"id": "103096"
},
{
"date": "2018-04-11T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-000013"
},
{
"date": "2021-09-13T12:22:39.027000",
"db": "NVD",
"id": "CVE-2018-6218"
},
{
"date": "2021-08-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201802-873"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201802-873"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Insecure DLL Loading issue in multiple Trend Micro products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-000013"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "code problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201802-873"
}
],
"trust": 0.6
}
}
VAR-200904-0687
Vulnerability from variot - Updated: 2022-05-17 01:58Multiple Trend Micro products are prone to a vulnerability that may allow certain compressed archives to bypass the scan engine. Successful exploits will allow attackers to distribute files containing malicious code that the antivirus application will fail to detect. ServerProtect for Microsoft Windows/Novell NetWare ServerProtect for EMC Celerra ServerProtect for NetApp ServerProtect for Linux ServerProtect for Network Appliance Filers Internet Security Pro Internet Security OfficeScan Component Worry Free Business Security - Standard Worry Free Business Security - Advanced Worry Free Business Security Hosted Housecall InterScan Web Security Suite InterScan Web Protect for ISA InterScan Messaging Security Appliance Neatsuite Advanced ScanMail for Exchange ScanMail for Domino Suites
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200904-0687",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "interscan viruswall",
"scope": "eq",
"trust": 1.2,
"vendor": "trend micro",
"version": "3.6"
},
{
"model": "interscan viruswall",
"scope": "eq",
"trust": 0.6,
"vendor": "trend micro",
"version": "3.0.1"
},
{
"model": "interscan webprotect for isa",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "interscan viruswall",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.3"
},
{
"model": "interscan viruswall for windows nt",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.51"
},
{
"model": "interscan viruswall build",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.61182"
},
{
"model": "interscan viruswall for windows",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "interscan viruswall for smb windows nt",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "serverprotect for windows",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.58"
},
{
"model": "officescan corporate edition",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "7.0"
},
{
"model": "scanmail for microsoft exchange",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.8"
},
{
"model": "worry-free business security",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.0"
},
{
"model": "interscan viruswall for windows nt",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.6"
},
{
"model": "officescan corporate edition for windows nt server",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.13"
},
{
"model": "serverprotect",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.5.8"
},
{
"model": "serverprotect (security patch",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.58"
},
{
"model": "officescan corporate edition",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "8.0"
},
{
"model": "scanmail for domino",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "2.51"
},
{
"model": "internet security pro",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "2009"
},
{
"model": "interscan viruswall for unix",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.0.1"
},
{
"model": "housecall",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.5"
},
{
"model": "server protect",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.58"
},
{
"model": "serverprotect for windows",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "officescan corporate edition 8.0.patch build",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "1042"
},
{
"model": "interscan viruswall build",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.71190"
},
{
"model": "interscan viruswall for smb",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "officescan corporate edition",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "6.5"
},
{
"model": "serverprotect",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.3.1"
},
{
"model": "interscan messaging security suite for linux",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "interscan viruswall",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.1"
},
{
"model": "interscan webmanager",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "1.2"
},
{
"model": "serverprotect for linux",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "officescan corporate edition sp1 patch",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "8.01"
},
{
"model": "officescan corporate edition",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.13"
},
{
"model": "housecall",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "6.61285"
},
{
"model": "housecall",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "6.51.0.1028"
},
{
"model": "officescan corporate edition for windows nt server",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.0"
},
{
"model": "interscan web security suite for windows",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.1"
},
{
"model": "interscan viruswall for windows nt build",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.521466"
},
{
"model": "interscan websecuritysuite for linux",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "officescan corporate edition",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.58"
},
{
"model": "interscan messaging security suite",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.5.1183"
},
{
"model": "officescan corporate edition for windows nt server",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.1.1"
},
{
"model": "internet security pro",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "2008"
},
{
"model": "serverprotect for network appliance filer",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.62"
},
{
"model": "interscan viruswall",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.81"
},
{
"model": "internet security",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "2009"
},
{
"model": "officescan corporate edition patch build",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "8.0211"
},
{
"model": "interscan emanager for windows",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.5.2"
},
{
"model": "officescan",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "7.3"
},
{
"model": "interscan web security suite for solaris",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "interscan viruswall for smb linux",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "interscan emanager j",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.51"
},
{
"model": "serverprotect for linux",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "1.2"
},
{
"model": "officescan corporate edition",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.0"
},
{
"model": "officescan corporate edition",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.54"
},
{
"model": "office scan",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "7.3"
},
{
"model": "interscan viruswall",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.32"
},
{
"model": "interscan viruswall for aix",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "interscan websecuritysuite for linux ja",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "1.0"
},
{
"model": "interscan webmanager",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "2.1"
},
{
"model": "officescan corporate edition build",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "7.31314"
},
{
"model": "officescan",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "7.0"
},
{
"model": "scanmail for domino",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "2.6"
},
{
"model": "interscan viruswall scan engine",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "7.510-1002"
},
{
"model": "interscan messaging security suite for linux",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.1.1"
},
{
"model": "interscan emanager",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.51"
},
{
"model": "interscan messaging security suite",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.5"
},
{
"model": "interscan messaging security suite",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.81"
},
{
"model": "interscan viruswall for windows nt",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.4"
},
{
"model": "internet security",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "2008"
},
{
"model": "interscan messaging security suite for windows",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "officescan corporate edition",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.02"
},
{
"model": "officescan corporate edition",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "6.0"
},
{
"model": "interscan viruswall for windows nt",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.1"
},
{
"model": "interscan viruswall build",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.61166"
},
{
"model": "officescan for microsoft sbs",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "4.5"
},
{
"model": "scanmail for microsoft exchange",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "6.2"
},
{
"model": "interscan web security suite for linux",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.1"
},
{
"model": "officescan corporate edition",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.5"
},
{
"model": "interscan viruswall",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.52"
},
{
"model": "officescan corporate edition",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "7.3"
},
{
"model": "interscan web security suite for windows",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "scanmail for microsoft exchange",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.81"
},
{
"model": "officescan sp patch",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "8.011"
},
{
"model": "officescan corporate edition for windows nt server",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.5"
},
{
"model": "interscan webmanager",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "2.0"
},
{
"model": "internet security suite",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "20070"
},
{
"model": "interscan viruswall for windows nt",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.5"
},
{
"model": "serverprotect",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.58"
},
{
"model": "officescan service pack",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "8.01"
},
{
"model": "scanmail for microsoft exchange",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "6.1"
},
{
"model": "interscan viruswall build",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.81130"
},
{
"model": "officescan corporate edition for windows nt server",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.11"
},
{
"model": "interscan web security suite for linux",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "officescan",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "8.0"
},
{
"model": "interscan emanager for hp",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.5"
},
{
"model": "interscan emanager for linux",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.6"
},
{
"model": "housecall",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "6.6.0.1278"
},
{
"model": "serverprotect for novell netware",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "interscan viruswall",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.7"
},
{
"model": "interscan emanager for sun",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.6"
},
{
"model": "officescan corporate edition",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.5"
},
{
"model": "serverprotect for emc",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.58"
},
{
"model": "serverprotect",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.7"
},
{
"model": "serverprotect for network appliance filer",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.61"
},
{
"model": "housecall",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "5.7"
},
{
"model": "interscan web security virtual appliance",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.1"
},
{
"model": "officescan corporate edition",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.11"
},
{
"model": "officescan corporate edition for smb2.0",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "6.0"
},
{
"model": "interscan web security suite",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "2.5"
},
{
"model": "interscan viruswall",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.2.3"
},
{
"model": "interscan messaging security suite for solaris",
"scope": null,
"trust": 0.3,
"vendor": "trend micro",
"version": null
},
{
"model": "interscan viruswall for windows nt",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.52"
},
{
"model": "interscan viruswall for unix",
"scope": "eq",
"trust": 0.3,
"vendor": "trend micro",
"version": "3.6x"
}
],
"sources": [
{
"db": "BID",
"id": "34763"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Thierry Zoller",
"sources": [
{
"db": "BID",
"id": "34763"
}
],
"trust": 0.3
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple Trend Micro products are prone to a vulnerability that may allow certain compressed archives to bypass the scan engine.\nSuccessful exploits will allow attackers to distribute files containing malicious code that the antivirus application will fail to detect.\nServerProtect for Microsoft Windows/Novell NetWare\nServerProtect for EMC Celerra\nServerProtect for NetApp\nServerProtect for Linux\nServerProtect for Network Appliance Filers\nInternet Security Pro Internet Security\nOfficeScan Component\nWorry Free Business Security - Standard\nWorry Free Business Security - Advanced\nWorry Free Business Security Hosted\nHousecall\nInterScan Web Security Suite\nInterScan Web Protect for ISA\nInterScan Messaging Security Appliance\nNeatsuite Advanced\nScanMail for Exchange\nScanMail for Domino Suites",
"sources": [
{
"db": "BID",
"id": "34763"
}
],
"trust": 0.3
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "34763",
"trust": 0.3
}
],
"sources": [
{
"db": "BID",
"id": "34763"
}
]
},
"id": "VAR-200904-0687",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 1.0
},
"last_update_date": "2022-05-17T01:58:09.755000Z",
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 0.3,
"url": "http://www.trend.com"
},
{
"trust": 0.3,
"url": "http://blog.zoller.lu/2009/04/trendmicro-multiple-evasion-and-bypass.html"
},
{
"trust": 0.3,
"url": "/archive/1/503076"
},
{
"trust": 0.3,
"url": "/archive/1/503078"
},
{
"trust": 0.3,
"url": "/archive/1/503391"
}
],
"sources": [
{
"db": "BID",
"id": "34763"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "34763"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-04-29T00:00:00",
"db": "BID",
"id": "34763"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-05-11T17:46:00",
"db": "BID",
"id": "34763"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "34763"
}
],
"trust": 0.3
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple Trend Micro Products RAR/ZIP/CAB Files Scan Evasion Vulnerability",
"sources": [
{
"db": "BID",
"id": "34763"
}
],
"trust": 0.3
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input Validation Error",
"sources": [
{
"db": "BID",
"id": "34763"
}
],
"trust": 0.3
}
}