CVE-2018-6229
Summary
| CVE | CVE-2018-6229 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-03-15 19:29:00 UTC |
| Updated | 2018-04-04 13:21:00 UTC |
| Description | A SQL injection vulnerability in an Trend Micro Email Encryption Gateway 5.5 edit policy script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system. |
Risk And Classification
Problem Types: CWE-89
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Trendmicro | Email Encryption Gateway | 5.5 | All | All | All |
| Application | Trendmicro | Email Encryption Gateway | 5.5 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Trend Micro Email Encryption Gateway Multiple Vulnerabilities | SecureAuth | MISC | www.coresecurity.com | Exploit, Technical Description, Third Party Advisory |
| New build to resolve multiple vulnerabilities - Trend Micro Email Encryption Gateway | CONFIRM | success.trendmicro.com | Patch, Vendor Advisory |
| Trend Micro Email Encryption Gateway 5.5 (Build 1111.00) - Multiple Vulnerabilities - JSP webapps Exploit | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.