cvelist/2020/28xxx/CVE-2020-28579.json

64 lines
1.3 KiB
JSON
Raw Normal View History

2020-11-13 20:04:48 +00:00
{
2020-11-18 10:35:18 -08:00
"CVE_data_meta" : {
"ASSIGNER" : "security@trendmicro.com",
"ID" : "CVE-2020-28579",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Trend Micro InterScan Web Security Virtual Appliance",
"version" : {
"version_data" : [
{
"version_value" : "6.5 SP2"
}
]
}
}
]
},
"vendor_name" : "Trend Micro"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an authenticated, remote attacker to send a specially crafted HTTP message and achieve remote code execution with elevated privileges."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Authenticated Remote Stack Buffer Overflow"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://success.trendmicro.com/solution/000281954"
},
{
"url" : "https://www.tenable.com/security/research/tra-2020-63"
}
]
}
}