Page 2 of 9 results (0.030 seconds)

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 0

Proxy command injection vulnerabilities in Trend Micro Mobile Security (Enterprise) versions before 9.7 Patch 3 allow remote attackers to execute arbitrary code on vulnerable installations. Varias vulnerabilidades de inyección de comandos proxy en las versiones anteriores a 9.7 Patch 3 de Trend Micro Mobile Security (Enterprise) permiten que atacantes remotos ejecuten código arbitrario en instalaciones vulnerables. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Mobile Security for Enterprise. Authentication is required to exploit this vulnerability. The specific flaw exists within the modTMCSS Proxy functionality. When parsing certain parameters and "type" is set to "WR," the process does not properly validate a user-supplied string before using it to execute a system call. • http://www.securityfocus.com/bid/100969 http://www.zerodayinitiative.com/advisories/ZDI-17-752 http://www.zerodayinitiative.com/advisories/ZDI-17-774 https://success.trendmicro.com/solution/1118224 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

There is Missing SSL Certificate Validation in the Trend Micro Enterprise Mobile Security Android Application before 9.7.1193, aka VRTS-398. Hay falta de validación de certificados SSL en la aplicación Android de Trend Micro Enterprise Mobile Security en versiones anteriores a 9.7.1193, también conocida como VRTS-398. • http://www.info-sec.ca/advisories/Trend-Micro-Enterprise-Mobile-Security.html http://www.securityfocus.com/bid/97272 https://success.trendmicro.com/solution/1116973 • CWE-295: Improper Certificate Validation •

CVSS: 7.4EPSS: 0%CPEs: 1EXPL: 0

Trend Micro Mobile Security for iOS before 3.2.1188 does not verify the X.509 certificate of the mobile application login server, which allows man-in-the-middle attackers to spoof this server and obtain sensitive information via a crafted certificate. Trend Micro Mobile Security para iOS en versiones anteriores a 3.2.1188 no verifica el certificado X.509 del servidor de acceso de la aplicación móvil, lo que permite a atacantes man-in-the-middle suplantar este servidor y obtener información sensible a través de un certificado manipulado. • http://packetstormsecurity.com/files/137020/Trend-Micro-Mobile-Security-Man-In-The-Middle.html http://www.info-sec.ca/advisories/Trend-Micro-Mobile-Security.html https://esupport.trendmicro.com/en-us/home/pages/technical-support/1114151.aspx • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

The Symantec Norton Mobile Security application 1.0 Beta for Android records setup details, possibly including wipe/lock credentials, in the device logs, which allows user-assisted remote attackers to obtain potentially sensitive information by leveraging the ability of a separate crafted application to read these logs. La aplicación Symantec Norton Mobile Security v1.0 Beta para Android guarda detalles de configuración, incluyendo posiblemente las credenciales wipe/lock en los registros del dispositivo, permitiendo a atacantes remotos asistidos por el usuario obtener información sensible mediante una aplicación independiente especialmente diseñada para leer estos registros. • http://osvdb.org/69253 http://www.securityfocus.com/bid/44767 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20101111_00 http://www.vupen.com/english/advisories/2010/2982 https://exchange.xforce.ibmcloud.com/vulnerabilities/63294 • CWE-255: Credentials Management Errors •