Page 39 of 196 results (0.015 seconds)

CVSS: 9.3EPSS: 95%CPEs: 1EXPL: 1

The extSetOwner function in the UfProxyBrowserCtrl ActiveX control (UfPBCtrl.dll) in Trend Micro Internet Security Pro 2010 allows remote attackers to execute arbitrary code via an invalid address that is dereferenced as a pointer. La función extSetOwner en el control ActiveX UfProxyBrowserCtrl (UfPBCtrl.dll) en Trend Micro Internet Security Pro 2010 permite a atacantes remotos ejecutar código de su elección a través de una dirección no válida que es desreferenciada como puntero. • https://www.exploit-db.com/exploits/15168 http://esupport.trendmicro.com/pages/Hot-Fix-UfPBCtrldll-is-vulnerable-to-remote-attackers.aspx http://secunia.com/advisories/41140 http://www.securityfocus.com/archive/1/513327/100/0/threaded http://www.securitytracker.com/id?1024364 http://www.vupen.com/english/advisories/2010/2185 http://www.zerodayinitiative.com/advisories/ZDI-10-165 https://exchange.xforce.ibmcloud.com/vulnerabilities/61397 https://oval.cisecurity.org/repository/search/definition/ • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 3

The TrendMicro Activity Monitor Module (tmactmon.sys) 2.52.0.1002 in Trend Micro Internet Pro 2008 and 2009, and Security Pro 2008 and 2009, allows local users to gain privileges via a crafted IRP in a METHOD_NEITHER IOCTL request to \Device\tmactmon that overwrites memory. Activity Monitor Module de TrendMicro (tmactmon.sys) versión 2.52.0.1002 en Internet Pro 2008 y 2009, y Security Pro 2008 y 2009 de Trend Micro, permite a los usuarios locales alcanzar privilegios por medio de un IRP diseñado en una petición IOCTL METHOD_NEITHER a \Device\tmactmon que sobrescribe la memoria. • https://www.exploit-db.com/exploits/8322 http://en.securitylab.ru/lab/PT-2009-09 http://milw0rm.com/sploits/2009-trendmicro_local_expl_0day.zip http://www.securityfocus.com/archive/1/502314/100/0/threaded http://www.securityfocus.com/bid/34304 http://www.securitytracker.com/id?1021955 https://exchange.xforce.ibmcloud.com/vulnerabilities/49513 • CWE-399: Resource Management Errors •

CVSS: 6.0EPSS: 0%CPEs: 1EXPL: 0

Trend Micro InterScan Web Security Suite (IWSS) 3.1 before build 1237 allows remote authenticated Auditor and Report Only users to bypass intended permission settings, and modify the system configuration, via requests to unspecified JSP pages. Trend Micro InterScan Web Security Suite (IWSS) v3.1 anterior a build v1237 permite a usuarios Auditor and Report Only autenticados remotamente evitar las configuraciones de permisos previstas, y modificar la configuración del sistema, a través de peticiones a páginas JSP sin especificar. • http://secunia.com/advisories/33867 http://www.securitytracker.com/id?1021694 http://www.trendmicro.com/ftp/documentation/readme/iwss_31_win_en_readme_CP_1237_EN.txt http://www.vupen.com/english/advisories/2009/0369 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 3.x and InterScan Web Security Suite (IWSS) 3.x, when basic authorization is enabled on the standalone proxy, forwards the Proxy-Authorization header from Windows Media Player, which allows remote web servers to obtain credentials by offering a media stream and then capturing this header. Trend Micro InterScan Web Security Virtual Appliance (IWSVA) v3.x e InterScan Web Security Suite (IWSS) v3.x, cuando la autorización básica está habilitada sobre el proxy independiente, reenvía la cabecera de autorización del proxy desde Windows Media Player, lo que permite a servidores Web remotos obtener credenciales ofreciendo una secuencia "media" y capturando esta cabecera. • http://secunia.com/advisories/33891 http://www.securityfocus.com/archive/1/500760/100/0/threaded http://www.securityfocus.com/bid/33687 http://www.securitytracker.com/id?1021716 https://exchange.xforce.ibmcloud.com/vulnerabilities/48681 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 12%CPEs: 4EXPL: 0

The web management console in Trend Micro OfficeScan 7.0 through 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote attackers to hijack sessions via brute-force attacks. NOTE: this can be leveraged for code execution through an unspecified "manipulation of the configuration." La consola de administración web en Trend Micro OfficeScan 7.0 hasta 8.0, Worry-Free Business Security 5.0, y Client/Server/Messaging Suite 3.5 y 3.6 crea una sesión de modo aleatorio basada sólo en el tiempo de acceso, lo cual hace más fácil para atacantes remotos secuestrar sesión a través de ataques de fuerza bruta. NOTA: esto puede ser aprovechado para la ejecución de código a través de una indeterminada "manipulación de la configuración". • http://secunia.com/advisories/31373 http://secunia.com/secunia_research/2008-31/advisory http://securityreason.com/securityalert/4191 http://www.securityfocus.com/archive/1/495670/100/0/threaded http://www.securityfocus.com/bid/30792 http://www.securitytracker.com/id?1020732 http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2402_readme.txt http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5%200_EN_CriticalPatch1404.txt http://www.vupen.com&#x • CWE-330: Use of Insufficiently Random Values •