Page 12 of 129 results (0.011 seconds)

CVSS: 6.9EPSS: 0%CPEs: 5EXPL: 0

Stack-based buffer overflow in vstlib32.dll 1.2.0.1012 in the SSAPI Engine 5.0.0.1066 through 5.2.0.1012 in Trend Micro AntiSpyware 3.5 and PC-Cillin Internet Security 2007 15.0 through 15.3, when the Venus Spy Trap (VST) feature is enabled, allows local users to cause a denial of service (service crash) or execute arbitrary code via a file with a long pathname, which triggers the overflow during a ReadDirectoryChangesW callback notification. Desbordamiento de búfer basado en pila en vstlib32.dll 1.2.0.1012 en SSAPI Engine 5.0.0.1066 hasta 5.2.0.1012 en Trend Micro AntiSpyware 3.5 y PC-Cillin Internet Security 2007 15.0 hasta 15.3, cuando la característica Venus Spy Trap (VST) está habilitada, permite a usuarios locales provocar una denegación de servicio (caída del servicio) o ejecutar código de su elección mediante un fichero con un nombre de ruta largo, lo cual provoca el desbordamiento durante una notificación ReadDirectoryChangesW recurrente. • http://esupport.trendmicro.com/support/consumer/search.do?cmd=displayKC&externalId=PUB-en-1035845 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=586 http://secunia.com/advisories/26557 http://securitytracker.com/id?1018592 http://www.securityfocus.com/bid/25388 http://www.vupen.com/english/advisories/2007/2935 https://exchange.xforce.ibmcloud.com/vulnerabilities/36144 •

CVSS: 10.0EPSS: 80%CPEs: 2EXPL: 0

Stack-based buffer overflow in CGIOCommon.dll before 8.0.0.1042 in Trend Micro OfficeScan Corporate Edition 8.0 allows remote attackers to execute arbitrary code via long crafted requests, as demonstrated using a long session cookie to unspecified CGI programs that use this library. Un desbordamiento de búfer en la región stack de la memoria en la biblioteca CGIOCommon.dll versiones anteriores a 8.0.0.1042 en Trend Micro OfficeScan Corporate Edition versión 8.0, permite a atacantes remotos ejecutar código arbitrario por medio de peticiones diseñadas largas, como es demostrado usando una cookie de sesión larga para programas CGI no especificados que utilizan esta biblioteca • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=559 http://osvdb.org/36629 http://secunia.com/advisories/25778 http://securitytracker.com/id?1018320 http://www.securityfocus.com/bid/24641 http://www.trendmicro.com/ftp/documentation/readme/osce_80_win_en_securitypatch_b1042_readme.txt http://www.vupen.com/english/advisories/2007/2330 https://exchange.xforce.ibmcloud.com/vulnerabilities/35051 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 14%CPEs: 1EXPL: 0

cgiChkMasterPwd.exe before 8.0.0.142 in Trend Micro OfficeScan Corporate Edition 8.0 allows remote attackers to bypass the password requirement and gain access to the Management Console via an empty hash and empty encrypted password string, related to "stored decrypted user logon information." El archivo cgiChkMasterPwd.exe versiones anteriores a 8.0.0.142 en Trend Micro OfficeScan Corporate Edition versión 8.0, permite a atacantes remotos omitir el requisito de contraseña y conseguir acceso a la Consola de Administración por medio de un hash vacío y una cadena de contraseña cifrada vacía, relacionada con la "stored decrypted user logon information". • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=558 http://osvdb.org/36628 http://secunia.com/advisories/25778 http://www.securityfocus.com/bid/24641 http://www.securityfocus.com/bid/24935 http://www.securitytracker.com/id?1018320 http://www.trendmicro.com/ftp/documentation/readme/osce_80_win_en_securitypatch_b1042_readme.txt http://www.vupen.com/english/advisories/2007/2330 https://exchange.xforce.ibmcloud.com/vulnerabilities/35052 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 10%CPEs: 1EXPL: 0

Multiple buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2- Build 1174 allow remote attackers to execute arbitrary code via a crafted RPC message processed by the (1) the RPCFN_ActiveRollback function in (a) stcommon.dll, or the (2) ENG_SetRealTimeScanConfigInfo or (3) ENG_SendEmail functions in (b) eng50.dll. Múltiples desbordamientos de búfer en Trend Micro ServerProtect 5.58 anterior al Security Patch 2-Build 1174 permiten a atacantes remotos ejecutar código de su elección mediante un mensaje RPC manipulado procesado por (1) la función RPCFN_ActiveRollback de (a) stcommon.dll, o las funciones (2) ENG_SetRealTimeScanConfigInfo o (3) ENG_SendEmail de (b) eng50.dll. • http://osvdb.org/35791 http://osvdb.org/35792 http://www.trendmicro.com/download_beta/product.asp?productid=17 http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch2_readme.txt http://www.vupen.com/english/advisories/2007/1689 https://exchange.xforce.ibmcloud.com/vulnerabilities/34171 •

CVSS: 10.0EPSS: 4%CPEs: 1EXPL: 0

Buffer overflow in AgRpcCln.dll for Trend Micro ServerProtect 5.58 for Windows before Security Patch 3 Build 1176 allows remote attackers to execute arbitrary code via unknown vectors related to RPC requests. NOTE: this is probably a different vulnerability than CVE-2007-2508. Desbordamiento de búfer en AgRpcCln.dll para Trend Micro ServerProtect 5.58 para Windows anberior a Security Patch 3 Build 1176 permite a atacantes remotos ejecutar código de su elección a través de vectores desconocidos relacionados con peticiones RPC. NOTA: esta es probablemente una vulnerabilidad distinta de CVE-2007-2508. • http://osvdb.org/35793 http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch3_readme.txt •