cve/2018/CVE-2018-6229.md

21 lines
980 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-6229](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6229)
![](https://img.shields.io/static/v1?label=Product&message=Trend%20Micro%20Email%20Encryption%20Gateway&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=SQL%20Injection&color=brighgreen)
### Description
A SQL injection vulnerability in an Trend Micro Email Encryption Gateway 5.5 edit policy script could allow an attacker to execute SQL commands to upload and execute arbitrary code that may harm the target system.
### POC
#### Reference
- https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities
2024-06-09 00:33:16 +00:00
- https://www.coresecurity.com/advisories/trend-micro-email-encryption-gateway-multiple-vulnerabilities
2024-05-26 14:27:05 +02:00
- https://www.exploit-db.com/exploits/44166/
2024-06-09 00:33:16 +00:00
- https://www.exploit-db.com/exploits/44166/
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.