Page 5 of 28 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Trend Micro Password Manager versions 3.x, 5.0, and 5.1 for Android is affected by a FLAG_MISUSE vulnerability that could be exploited to allow the application to share information to third-party applications on the device. Trend Micro Password Manager versiones 3.x, 5.0 y 5.1 para Android, están afectadas por una vulnerabilidad FLAG_MISUSE que podría ser explotada para permitir a la aplicación compartir información con aplicaciones de terceros en el dispositivo. • https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124012.aspx •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A DLL hijacking vulnerability exists in Trend Micro Password Manager 5.0 in which, if exploited, would allow an attacker to load an arbitrary unsigned DLL into the signed service's process. This process is very similar, yet not identical to CVE-2019-14684. Existe una vulnerabilidad de secuestro de DLL en Trend Micro Password Manager 5.0 en el que, si se explota, permitiría a un atacante cargar una DLL arbitraria sin firmar en el proceso del servicio firmado. Este proceso es muy similar, pero no idéntico al CVE-2019-14684. • https://esupport.trendmicro.com/en-us/home/pages/technical-support/1123396.aspx https://medium.com/%40infiniti_css/fa839acaad59 • CWE-427: Uncontrolled Search Path Element •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 1

A DLL hijacking vulnerability exists in Trend Micro Password Manager 5.0 in which, if exploited, would allow an attacker to load an arbitrary unsigned DLL into the signed service's process. This process is very similar, yet not identical to CVE-2019-14687. Existe una vulnerabilidad de secuestro de DLL en Trend Micro Password Manager 5.0 en el que, si se explota, permitiría a un atacante cargar una DLL arbitraria sin firmar en el proceso del servicio firmado. Este proceso es muy similar, pero no idéntico al CVE-2019-14687. • https://esupport.trendmicro.com/en-us/home/pages/technical-support/1123396.aspx https://safebreach.com/Post/Trend-Micro-Password-Manager-Privilege-Escalation-to-SYSTEM • CWE-427: Uncontrolled Search Path Element •

CVSS: 3.9EPSS: 0%CPEs: 2EXPL: 0

Norton Password Manager, prior to 6.3.0.2082, may be susceptible to an address spoofing issue. This type of issue may allow an attacker to disguise their origin IP address in order to obfuscate the source of network traffic. Norton Password Manager, anterior a versión 6.3.0.2082, puede ser susceptible a un problema de suplantación de direcciones. Este clase de problema puede permitir a un atacante disfrazar su dirección IP de origen para ofuscar la fuente del tráfico de la red. • https://support.symantec.com/us/en/article.SYMSA1483.html •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Uniqkey Password Manager 1.14. Upon entering new credentials to a site that is not registered within this product, a pop-up window will appear prompting the user if they want to save this new password. This pop-up window will persist on any page the user enters within the browser until a decision is made. The code of the pop-up window can be read by remote servers and contains the login credentials and URL in cleartext. A malicious server could easily grab this information from the pop-up. • https://cxsecurity.com/issue/WLB-2019040055 https://packetstormsecurity.com/files/152410/Uniqkey-Password-Manager-1.14-Credential-Disclosure.html https://seclists.org/fulldisclosure/2019/Apr/1 https://vuldb.com/?id.132740 • CWE-269: Improper Privilege Management •