Search for vulnerabilities
| Vulnerability ID | VCID-e5pv-xmcx-hfc7 |
| Aliases |
CVE-2008-2938
GHSA-m7xj-ccqc-p4g2 |
| Summary | |
| Status | Published |
| Exploitability | 2.0 |
| Weighted Severity | 6.2 |
| Risk | 10.0 |
| Affected and Fixed Packages | Package Details |
| Data source | Metasploit |
|---|---|
| Description | This module tests whether a directory traversal vulnerability is present in Trend Micro DLP (Data Loss Prevention) Appliance v5.5 build <= 1294. The vulnerability appears to be actually caused by the Tomcat UTF-8 bug which is implemented in module tomcat_utf8_traversal CVE 2008-2938. This module simply tests for the same bug with Trend Micro specific settings. Note that in the Trend Micro appliance, /etc/shadow is not used and therefore password hashes are stored and anonymously accessible in the passwd file. |
| Note | Stability: - crash-safe SideEffects: - ioc-in-logs Reliability: [] |
| Ransomware campaign use | Unknown |
| Source publication date | Jan. 9, 2009 |
| Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/admin/http/trendmicro_dlp_traversal.rb |
| Data source | Exploit-DB |
|---|---|
| Date added | July 28, 2010 |
| Description | Apache Tomcat < 6.0.18 - 'utf8' Directory Traversal |
| Ransomware campaign use | Known |
| Source publication date | July 28, 2010 |
| Exploit type | remote |
| Platform | unix |
| Source update date | March 30, 2017 |
| Percentile | 0.99763 |
| EPSS Score | 0.92931 |
| Published At | Sept. 21, 2025, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2025-07-31T07:58:39.009686+00:00 | ProjectKB MSRImporter | Import | https://raw.githubusercontent.com/SAP/project-kb/master/MSR2019/dataset/vulas_db_msr2019_release.csv | 37.0.0 |