Page 2 of 22 results (0.010 seconds)

CVSS: 8.8EPSS: 2%CPEs: 1EXPL: 0

XXXStatusXXX, XXXSummary, TemplateXXX and XXXCompliance method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. Una vulnerabilidad de ejecución remota de código (RCE) por inyección SQL en los métodos XXXStatusXXX, XXXSummary, TemplateXXX y XXXCompliance en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto ejecute código arbitrario en instalaciones vulnerables. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ThreatDistributedTrail method, which is called by the reporting servlet. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-083 https://www.zerodayinitiative.com/advisories/ZDI-18-085 https://www.zerodayinitiative.com/advisories/ZDI-18-086 https://www.zerodayinitiative.com/advisories/ZDI-18-089 https://www.zerodayinitiative.com/advisories/ZDI-18-091 https://www.zerodayinitiative.com/advisories/ZDI-18-092 https://www.zerodayinitiative.com/advisories/ZDI-18-093 https://www.zerodayinitiative.com/advisories/ZDI-18-099 https:/ • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 2%CPEs: 1EXPL: 0

XXXTreeNode method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. Una vulnerabilidad de ejecución remota de código (RCE) por inyección SQL en el método XXXTreeNode en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto ejecute código arbitrario en instalaciones vulnerables. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ClearSelectedTreeNode method, which is called by the reporting servlet. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-090 https://www.zerodayinitiative.com/advisories/ZDI-18-094 https://www.zerodayinitiative.com/advisories/ZDI-18-109 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 2%CPEs: 1EXPL: 0

TopXXX, ViolationXXX, and IncidentXXX method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. Una vulnerabilidad de ejecución remota de código (RCE) por inyección SQL en los métodos TopXXX, ViolationXXX e IncidentXXX en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto ejecute código arbitrario en instalaciones vulnerables. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the DLPIncidentJobWidget method, which is called by the reporting servlet. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-069 https://www.zerodayinitiative.com/advisories/ZDI-18-070 https://www.zerodayinitiative.com/advisories/ZDI-18-071 https://www.zerodayinitiative.com/advisories/ZDI-18-072 https://www.zerodayinitiative.com/advisories/ZDI-18-073 https://www.zerodayinitiative.com/advisories/ZDI-18-074 https://www.zerodayinitiative.com/advisories/ZDI-18-075 https://www.zerodayinitiative.com/advisories/ZDI-18-076 https:/ • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 79%CPEs: 1EXPL: 0

GetXXX method SQL injection remote code execution (RCE) vulnerabilities in Trend Micro Control Manager 6.0 could allow a remote attacker to execute arbitrary code on vulnerable installations. Una vulnerabilidad de ejecución remota de código (RCE) por inyección SQL en el método GetXXX en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto ejecute código arbitrario en instalaciones vulnerables. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the GetChannelList method, which is called by the reporting servlet. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-067 https://www.zerodayinitiative.com/advisories/ZDI-18-084 https://www.zerodayinitiative.com/advisories/ZDI-18-088 https://www.zerodayinitiative.com/advisories/ZDI-18-095 https://www.zerodayinitiative.com/advisories/ZDI-18-096 https://www.zerodayinitiative.com/advisories/ZDI-18-097 https://www.zerodayinitiative.com/advisories/ZDI-18-102 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

A external entity processing information disclosure (XXE) vulnerability in Trend Micro Control Manager 6.0 could allow a remote attacker to disclose sensitive information on vulnerable installations. Una vulnerabilidad de revelación de información de procesamiento de entidades externas (XEE) en Trend Micro Control Manager 6.0 podría permitir que un atacante remoto revele información sensible en instalaciones vulnerables. This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Trend Micro Control Manager. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within processing of AdHocQuery_Processor. Due to the improper restriction of XML External Entity (XXE) reference, a specially crafted URI causes the XML parser to access the contents of this URI and embed these contents back into the XML document for further processing. • https://success.trendmicro.com/solution/1119158 https://www.zerodayinitiative.com/advisories/ZDI-18-111 • CWE-611: Improper Restriction of XML External Entity Reference •