A directory traversal vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to read arbitrary files from the file system. Please note: an attacker must first obtain compromised access to the target Deep Security Manager (DSM) or the target agent must be not yet activated or configured in order to exploit this vulnerability.
- https://success.trendmicro.com/solution/000290104
- https://www.modzero.com/advisories/MZ-21-02-Trendmicro.txt
- https://github.com/0x7n6/OSCP
- https://github.com/0xStrygwyr/OSCP-Guide
- https://github.com/0xZipp0/OSCP
- https://github.com/0xsyr0/OSCP
- https://github.com/AMatheusFeitosaM/OSCP-Cheat
- https://github.com/ARPSyndicate/cvemon
- https://github.com/EnriqueSanchezdelVillar/NotesHck
- https://github.com/Faizan-Khanx/OSCP
- https://github.com/Ly0nt4r/OSCP
- https://github.com/ReflectedThanatos/OSCP-cheatsheet
- https://github.com/SantoriuHen/NotesHck
- https://github.com/SenukDias/OSCP_cheat
- https://github.com/SirElmard/ethical_hacking
- https://github.com/VishuGahlyan/OSCP
- https://github.com/e-hakson/OSCP
- https://github.com/eljosep/OSCP-Guide
- https://github.com/exfilt/CheatSheet
- https://github.com/fazilbaig1/oscp
- https://github.com/jitmondal1/OSCP
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/modzero/MZ-21-02-Trendmicro
- https://github.com/nitishbadole/oscp-note-3
- https://github.com/oscpname/OSCP_cheat
- https://github.com/parth45/cheatsheet
- https://github.com/revanmalang/OSCP
- https://github.com/txuswashere/OSCP
- https://github.com/xhref/OSCP