3 results (0.001 seconds)

CVSS: 7.0EPSS: 0%CPEs: 12EXPL: 0

20 Feb 2020 — Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial product installation by an authorized user. The attacker must convince the target to download malicious DLL locally which must be present when the installer is run. Trend Micro ha reempaquetado instaladores para varios... • https://success.trendmicro.com/solution/1123562 • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.0EPSS: 0%CPEs: 8EXPL: 0

16 Feb 2018 — A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an attacker to run arbitrary code on a vulnerable system. Una vulnerabilidad de secuestro de DLL en Trend Micro's User-Mode Hooking Module (UMH) podría permitir que un atacante ejecute código arbitrario en un sistema vulnerable. • http://www.securityfocus.com/bid/103096 • CWE-426: Untrusted Search Path •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

10 Mar 2017 — Trend Micro Endpoint Sensor 1.6 before b1290 has a DLL hijacking vulnerability that allows remote attackers to execute arbitrary code, aka Trend Micro Vulnerability Identifier 2015-0208. Trend Micro Endpoint Sensor 1.6 en versiones anteriores a b1290 tiene una vulnerabilidad de secuestro de DLL que permite a atacantes remotos ejecutar código arbitrario, vulnerabilidad también conocida como Trend Micro Vulnerability Identifier 2015-0208. • http://www.securityfocus.com/bid/96857 • CWE-426: Untrusted Search Path •