3 results (0.001 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro InterScan Messaging Security Suite 7.1-Build_Win32_1394 allow remote attackers to inject arbitrary web script or HTML via (1) the wrsApprovedURL parameter to addRuleAttrWrsApproveUrl.imss or (2) the src parameter to initUpdSchPage.imss. Múltiples vulnerabilidades de ejecución de secuencias de comandos en sitios cruzados (XSS) en Trend Micro InterScan Messaging Security Suite v7.1-Build_Win32_1394, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de los parámetros (1) wrsApprovedURL a addRuleAttrWrsApproveUrl.imss o (2) src a initUpdSchPage.imss. Trend Micro InterScan Messaging Security Suite suffers from stored cross site scripting and cross site request forgery vulnerabilities. • https://www.exploit-db.com/exploits/21319 http://secunia.com/advisories/50620 http://www.kb.cert.org/vuls/id/471364 http://www.securitytracker.com/id?1027544 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 2

Cross-site request forgery (CSRF) vulnerability in saveAccountSubTab.imss in Trend Micro InterScan Messaging Security Suite 7.1-Build_Win32_1394 allows remote attackers to hijack the authentication of administrators for requests that create admin accounts via a saveAuth action. Vulnerabilidad de falsificación de peticiones en sitios cruzados (CSRF) en saveAccountSubTab.imss en Trend Micro InterScan Messaging Security Suite v7.1-Build_Win32_1394, permite a atacantes remotos secuestrar la autenticación de administradores para peticiones que crean cuentas de administración a través de una acción saveAuth. Trend Micro InterScan Messaging Security Suite suffers from stored cross site scripting and cross site request forgery vulnerabilities. • https://www.exploit-db.com/exploits/21319 http://secunia.com/advisories/50620 http://www.kb.cert.org/vuls/id/471364 http://www.securitytracker.com/id?1027544 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

ISNTSmtp directory in Trend Micro InterScan Messaging Security Suite (IMSS) 5.5 build 1183 and possibly other versions before 5.7.0.1121, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying ISNTSysMonitor.exe. • http://secunia.com/advisories/19022 http://www.secumind.net/content/french/modules/news/article.php?storyid=9&sel_lang=english http://www.vupen.com/english/advisories/2006/1041 https://exchange.xforce.ibmcloud.com/vulnerabilities/25415 • CWE-264: Permissions, Privileges, and Access Controls •