A command injection vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2, with the improved password hashing method enabled, could allow an unauthenticated attacker to execute certain commands by providing a manipulated password.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2024-08-04T10:03:44.800Z
Reserved: 2020-01-30T00:00:00
Link: CVE-2020-8466

No data.

Status : Modified
Published: 2020-12-17T21:15:13.147
Modified: 2024-11-21T05:38:53.680
Link: CVE-2020-8466

No data.