cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score
CVE-2024-46902,https://securityvulnerability.io/vulnerability/CVE-2024-46902,Vulnerability in Trend Micro Deep Discovery Inspector Could Allow Sensitive Information Disclosure,"An identified vulnerability in Trend Micro Deep Discovery Inspector (DDI) versions 5.8 and above creates a potential for attackers to disclose sensitive information from compromised installations. To exploit this vulnerability, an attacker must first secure administrative user rights on the target system. This pre-requisite highlights the importance of controlling access to high-privilege accounts, as exploitation hinges on obtaining these elevated permissions. Organizations utilizing Trend Micro DDI should prioritize reviewing their security practices and user access controls to mitigate the risks associated with this vulnerability.",Trend Micro,Deep Discovery Inspector,9.1,CRITICAL,0.0006600000197067857,false,false,false,false,,false,false,2024-10-22T19:15:00.000Z,0
CVE-2024-46903,https://securityvulnerability.io/vulnerability/CVE-2024-46903,Attackers could disclose sensitive information through DDI vulnerability,"A vulnerability in Trend Micro Deep Discovery Inspector (DDI) versions 5.8 and above could allow an attacker to disclose sensitive information affected installations.

Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.",Trend Micro,Trend Micro Deep Discovery Inspector,6.5,MEDIUM,0.0010499999625608325,false,false,false,false,,false,false,2024-10-22T19:15:00.000Z,0
CVE-2018-15365,https://securityvulnerability.io/vulnerability/CVE-2018-15365,,A Reflected Cross-Site Scripting (XSS) vulnerability in Trend Micro Deep Discovery Inspector 3.85 and below could allow an attacker to bypass CSRF protection and conduct an attack on vulnerable installations. An attacker must be an authenticated user in order to exploit the vulnerability.,Trend Micro,Trend Micro Deep Discovery Inspector,5.4,MEDIUM,0.0010400000028312206,false,false,false,true,true,false,false,2018-09-28T17:00:00.000Z,0
CVE-2017-11382,https://securityvulnerability.io/vulnerability/CVE-2017-11382,,"Denial of Service vulnerability in Trend Micro Deep Discovery Email Inspector 2.5.1 allows remote attackers to delete arbitrary files on vulnerable installations, thus disabling the service. Formerly ZDI-CAN-4350.",Trend Micro,Trend Micro Deep Discovery Email Inspector,7.5,HIGH,0.010320000350475311,false,false,false,false,,false,false,2017-08-03T15:29:00.000Z,0
CVE-2016-5840,https://securityvulnerability.io/vulnerability/CVE-2016-5840,,"hotfix_upload.cgi in Trend Micro Deep Discovery Inspector (DDI) 3.7, 3.8 SP1 (3.81), and 3.8 SP2 (3.82) allows remote administrators to execute arbitrary code via shell metacharacters in the filename parameter of the Content-Disposition header.",Trend Micro,Deep Discovery Inspector,7.2,HIGH,0.03677000105381012,false,false,false,false,,false,false,2016-06-30T16:00:00.000Z,0