Page 2 of 18 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 25EXPL: 0

05 Aug 2020 — An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.... • https://jvn.jp/en/vu/JVNVU99160193/index.html • CWE-20: Improper Input Validation •

CVSS: 7.0EPSS: 0%CPEs: 12EXPL: 0

20 Feb 2020 — Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial product installation by an authorized user. The attacker must convince the target to download malicious DLL locally which must be present when the installer is run. Trend Micro ha reempaquetado instaladores para varios... • https://success.trendmicro.com/solution/1123562 • CWE-427: Uncontrolled Search Path Element •

CVSS: 6.1EPSS: 1%CPEs: 1EXPL: 4

24 May 2017 — Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) T1 or (2) tmLastConfigFileModifiedDate parameter to log_management.cgi. Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en ServerProtect de Trend Micro para Linux versión 3.0 anterior a CP 1531, permiten a atacantes remotos inyectar script web o HTML arbitrario por medio del parámetro (1) T1 o (2) tmLastConfigFil... • https://packetstorm.news/files/id/142645 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 4

24 May 2017 — Cross-site request forgery (CSRF) vulnerability in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows remote attackers to hijack the authentication of users for requests to start an update from an arbitrary source via a crafted request to SProtectLinux/scanoption_set.cgi, related to the lack of anti-CSRF tokens. Una vulnerabilidad de tipo cross-site request forgery (CSRF) en ServerProtect de Trend Micro para Linux versión 3.0 anterior a CP 1531, permite a los atacantes remotos secuestrar la auten... • https://packetstorm.news/files/id/142645 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 10.0EPSS: 7%CPEs: 1EXPL: 4

24 May 2017 — Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows attackers to write to arbitrary files and consequently execute arbitrary code with root privileges by leveraging failure to validate software updates. ServerProtect de Trend Micro para Linux versión 3.0 anterior a CP 1531 permite a los atacantes escribir en archivos arbitrarios y en consecuencia, ejecutar código arbitrario con privilegios de root mediante el aprovechamiento del fallo para comprobar las actualizaciones del programa. Trend Micro Se... • https://packetstorm.news/files/id/142645 • CWE-20: Improper Input Validation •

CVSS: 7.4EPSS: 0%CPEs: 1EXPL: 4

24 May 2017 — Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows attackers to eavesdrop and tamper with updates by leveraging unencrypted communications with update servers. Trend Micro ServerProtect para Linux 3.0 en versiones anteriores a la CP 1531 permite a los atacantes escuchar y manipular actualizaciones, aprovechando comunicaciones sin cifrar con servidores de actualización. Trend Micro ServerProtect suffers from information disclosure, manipulation, cross site request forgery, cross site scripting, an... • https://packetstorm.news/files/id/142645 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 4

24 May 2017 — Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows local users to gain privileges by leveraging an unrestricted quarantine directory. Trend Micro ServerProtect para Linux 3.0 en versiones anteriores a la CP 1531, permite a los usuarios locales obtener privilegios manipulando un directorio de cuarentena no restringido. Trend Micro ServerProtect suffers from information disclosure, manipulation, cross site request forgery, cross site scripting, and various other vulnerabilities. • https://packetstorm.news/files/id/142645 • CWE-862: Missing Authorization •

CVSS: 6.1EPSS: 1%CPEs: 1EXPL: 4

24 May 2017 — Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) S44, (2) S5, (3) S_action_fail, (4) S_ptn_update, (5) T113, (6) T114, (7) T115, (8) T117117, (9) T118, (10) T_action_fail, (11) T_ptn_update, (12) textarea, (13) textfield5, or (14) tmLastConfigFileModifiedDate parameter to notification.cgi. Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en ServerProtect de Tren... • https://packetstorm.news/files/id/142645 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •