First published: Mon Sep 17 2012(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro InterScan Messaging Security Suite 7.1-Build_Win32_1394 allow remote attackers to inject arbitrary web script or HTML via (1) the wrsApprovedURL parameter to addRuleAttrWrsApproveUrl.imss or (2) the src parameter to initUpdSchPage.imss.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan Messaging Security Suite | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2995 is classified as a moderate severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2012-2995, users should update Trend Micro InterScan Messaging Security Suite to the latest patched version that addresses this vulnerability.
CVE-2012-2995 can be exploited for cross-site scripting attacks, which may allow attackers to inject malicious scripts into web pages viewed by users.
CVE-2012-2995 affects Trend Micro InterScan Messaging Security Suite version 7.1.
The parameters involved in CVE-2012-2995 are 'wrsApprovedURL' and 'src', which allow for the injection of malicious scripts.