CVE-2015-2873
Summary
| CVE | CVE-2015-2873 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-08-23 15:59:00 UTC |
| Updated | 2021-09-09 17:48:00 UTC |
| Description | Trend Micro Deep Discovery Inspector (DDI) on Deep Discovery Threat appliances with software before 3.5.1477, 3.6.x before 3.6.1217, 3.7.x before 3.7.1248, 3.8.x before 3.8.1263, and other versions allows remote attackers to obtain sensitive information or change the configuration via a direct request to the (1) system log URL, (2) whitelist URL, or (3) blacklist URL. |
Risk And Classification
Problem Types: CWE-425
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Trend Micro Deep Discovery Inspector CVE-2015-2873 Multiple Authentication Bypass Vulnerabilities | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Cross-Site Scripting Vulnerability [CVE-2015-2872] | CONFIRM | esupport.trendmicro.com | Patch, Vendor Advisory |
| Vulnerability Note VU#248692 - Trend Micro Deep Discovery threat appliance contains multiple vulnerabilities | CERT-VN | www.kb.cert.org | Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.