CVE-2018-6222
Summary
| CVE | CVE-2018-6222 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-03-15 19:29:00 UTC |
| Updated | 2019-10-03 00:03:00 UTC |
| Description | Arbitrary logs location in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to change location of log files and be manipulated to execute arbitrary commands and attain command execution on a vulnerable system. |
Risk And Classification
Problem Types: CWE-78
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Trendmicro | Email Encryption Gateway | 5.5 | All | All | All |
| Application | Trendmicro | Email Encryption Gateway | 5.5 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Trend Micro Email Encryption Gateway Multiple Vulnerabilities | SecureAuth | MISC | www.coresecurity.com | Exploit, Technical Description, Third Party Advisory |
| New build to resolve multiple vulnerabilities - Trend Micro Email Encryption Gateway | CONFIRM | success.trendmicro.com | Patch, Vendor Advisory |
| Trend Micro Email Encryption Gateway 5.5 (Build 1111.00) - Multiple Vulnerabilities - JSP webapps Exploit | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.