Page 5 of 27 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A DLL hijacking vulnerability exists in Trend Micro Password Manager 5.0 in which, if exploited, would allow an attacker to load an arbitrary unsigned DLL into the signed service's process. This process is very similar, yet not identical to CVE-2019-14684. Existe una vulnerabilidad de secuestro de DLL en Trend Micro Password Manager 5.0 en el que, si se explota, permitiría a un atacante cargar una DLL arbitraria sin firmar en el proceso del servicio firmado. Este proceso es muy similar, pero no idéntico al CVE-2019-14684. • https://esupport.trendmicro.com/en-us/home/pages/technical-support/1123396.aspx https://medium.com/%40infiniti_css/fa839acaad59 • CWE-427: Uncontrolled Search Path Element •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 1

A DLL hijacking vulnerability exists in Trend Micro Password Manager 5.0 in which, if exploited, would allow an attacker to load an arbitrary unsigned DLL into the signed service's process. This process is very similar, yet not identical to CVE-2019-14687. Existe una vulnerabilidad de secuestro de DLL en Trend Micro Password Manager 5.0 en el que, si se explota, permitiría a un atacante cargar una DLL arbitraria sin firmar en el proceso del servicio firmado. Este proceso es muy similar, pero no idéntico al CVE-2019-14687. • https://esupport.trendmicro.com/en-us/home/pages/technical-support/1123396.aspx https://safebreach.com/Post/Trend-Micro-Password-Manager-Privilege-Escalation-to-SYSTEM • CWE-427: Uncontrolled Search Path Element •

CVSS: 3.9EPSS: 0%CPEs: 2EXPL: 0

Norton Password Manager, prior to 6.3.0.2082, may be susceptible to an address spoofing issue. This type of issue may allow an attacker to disguise their origin IP address in order to obfuscate the source of network traffic. Norton Password Manager, anterior a versión 6.3.0.2082, puede ser susceptible a un problema de suplantación de direcciones. Este clase de problema puede permitir a un atacante disfrazar su dirección IP de origen para ofuscar la fuente del tráfico de la red. • https://support.symantec.com/us/en/article.SYMSA1483.html •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Uniqkey Password Manager 1.14. Upon entering new credentials to a site that is not registered within this product, a pop-up window will appear prompting the user if they want to save this new password. This pop-up window will persist on any page the user enters within the browser until a decision is made. The code of the pop-up window can be read by remote servers and contains the login credentials and URL in cleartext. A malicious server could easily grab this information from the pop-up. • https://cxsecurity.com/issue/WLB-2019040055 https://packetstormsecurity.com/files/152410/Uniqkey-Password-Manager-1.14-Credential-Disclosure.html https://seclists.org/fulldisclosure/2019/Apr/1 https://vuldb.com/?id.132740 • CWE-269: Improper Privilege Management •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Uniqkey Password Manager 1.14 contains a vulnerability because it fails to recognize the difference between domains and sub-domains. The vulnerability means that passwords saved for example.com will be recommended for usersite.example.com. This could lead to successful phishing campaigns and create a sense of false security. Uniqkey Password Manager 1.14 contiene una vulnerabilidad porque no reconoce correctamente la diferencia entre los dominios y subdominios. Esta vulnerabilidad significa que las contraseñas guardadas para example.com serán recomendadas para usersite.example.com. • https://vuldb.com/?id.133069 • CWE-287: Improper Authentication •