{"api_version":"1","generated_at":"2026-04-23T02:35:15+00:00","cve":"CVE-2018-15365","urls":{"html":"https://cve.report/CVE-2018-15365","api":"https://cve.report/api/cve/CVE-2018-15365.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-15365","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-15365"},"summary":{"title":"CVE-2018-15365","description":"A Reflected Cross-Site Scripting (XSS) vulnerability in Trend Micro Deep Discovery Inspector 3.85 and below could allow an attacker to bypass CSRF protection and conduct an attack on vulnerable installations. An attacker must be an authenticated user in order to exploit the vulnerability.","state":"PUBLIC","assigner":"security@trendmicro.com","published_at":"2018-09-28 17:29:00","updated_at":"2018-11-16 12:54:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/nixwizard/CVE-2018-15365/","name":"https://github.com/nixwizard/CVE-2018-15365/","refsource":"MISC","tags":["Exploit","Mitigation","Third Party Advisory"],"title":"GitHub - nixwizard/CVE-2018-15365","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://success.trendmicro.com/solution/1121079","name":"https://success.trendmicro.com/solution/1121079","refsource":"CONFIRM","tags":["Mitigation","Vendor Advisory"],"title":"SECURITY BULLETIN:  Trend Micro Deep Discovery Inspector Reflected Cross-site Scripting (XSS) Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-15365","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-15365","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"15365","vulnerable":"1","versionEndIncluding":"3.85","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trendmicro","cpe5":"deep_discovery_inspector","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@trendmicro.com","ID":"CVE-2018-15365","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Trend Micro Deep Discovery Inspector","version":{"version_data":[{"version_value":"3.85"}]}}]},"vendor_name":"Trend Micro"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A Reflected Cross-Site Scripting (XSS) vulnerability in Trend Micro Deep Discovery Inspector 3.85 and below could allow an attacker to bypass CSRF protection and conduct an attack on vulnerable installations. An attacker must be an authenticated user in order to exploit the vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Reflected XSS"}]}]},"references":{"reference_data":[{"name":"https://success.trendmicro.com/solution/1121079","refsource":"CONFIRM","url":"https://success.trendmicro.com/solution/1121079"},{"name":"https://github.com/nixwizard/CVE-2018-15365/","refsource":"MISC","url":"https://github.com/nixwizard/CVE-2018-15365/"}]}},"nvd":{"publishedDate":"2018-09-28 17:29:00","lastModifiedDate":"2018-11-16 12:54:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:trendmicro:deep_discovery_inspector:*:*:*:*:*:*:*:*","versionEndIncluding":"3.85","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"15365","Ordinal":"132100","Title":"CVE-2018-15365","CVE":"CVE-2018-15365","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"15365","Ordinal":"1","NoteData":"A Reflected Cross-Site Scripting (XSS) vulnerability in Trend Micro Deep Discovery Inspector 3.85 and below could allow an attacker to bypass CSRF protection and conduct an attack on vulnerable installations. An attacker must be an authenticated user in order to exploit the vulnerability.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"15365","Ordinal":"2","NoteData":"2018-09-28","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"15365","Ordinal":"3","NoteData":"2018-09-28","Type":"Other","Title":"Modified"}]}}}