6 results (0.011 seconds)

CVSS: 7.3EPSS: 0%CPEs: 2EXPL: 0

An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. Una vulnerabilidad de escalada de privilegios de elementos de búsqueda no controlada en Trend Micro HouseCall for Home Networks versión 5.3.1225 y por debajo, podría permitir a un atacante escalar privilegios al colocar un archivo diseñado a medida en un directorio específico para cargar una biblioteca maliciosa. Tenga en cuenta que un atacante debe obtener primero la capacidad de ejecutar código con pocos privilegios en el sistema de destino para explotar esta vulnerabilidad This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro HouseCall for Home Networks. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of OpenSSL. • https://helpcenter.trendmicro.com/en-us/article/tmka-10626 https://helpcenter.trendmicro.com/ja-jp/article/TMKA-10621 https://www.zerodayinitiative.com/advisories/ZDI-21-1112 • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.3EPSS: 0%CPEs: 2EXPL: 0

An incorrect permission vulnerability in the product installer for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a scan. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. Una vulnerabilidad de permiso incorrecto en el instalador del producto para Trend Micro HouseCall for Home Networks versiones 5.3.1179 y anteriores, podría permitir a un atacante escalar privilegios colocando código arbitrario en una carpeta específica y que un administrador que esté ejecutando un escaneo ejecutar ese código. Tome en cuenta que un atacante debe primero obtener la habilidad de ejecutar código poco privilegiado en el sistema de destino para explotar esta vulnerabilidad This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro HouseCall for Home Networks. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the product installer. • https://helpcenter.trendmicro.com/en-us/article/TMKA-10310 https://www.zerodayinitiative.com/advisories/ZDI-21-474 • CWE-276: Incorrect Default Permissions •

CVSS: 7.3EPSS: 0%CPEs: 2EXPL: 0

An incorrect permission vulnerability in the product installer folders for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a scan. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. Una vulnerabilidad de permiso incorrecto en las carpetas del instalador del producto para Trend Micro HouseCall for Home Networks versiones 5.3.1179 y anteriores, podría permitir a un atacante escalar privilegios al colocar código arbitrario en una carpeta específica y que ese código sea ejecutado por un administrador que esté ejecutando un escaneo. Tome en cuenta que un atacante debe primero obtener la habilidad de ejecutar código poco privilegio en el sistema de destino para explotar esta vulnerabilidad This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro HouseCall for Home Networks. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the product installer. • https://helpcenter.trendmicro.com/en-us/article/TMKA-10310 https://www.zerodayinitiative.com/advisories/ZDI-21-475 • CWE-276: Incorrect Default Permissions •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

A DLL hijacking vulnerability Trend Micro HouseCall for Home Networks version 5.3.1063 and below could allow an attacker to use a malicious DLL to escalate privileges and perform arbitrary code execution. An attacker must already have user privileges on the machine to exploit this vulnerability. Una vulnerabilidad de secuestro de DLL de Trend Micro HouseCall for Home Networks versiones 5.3.1063 y anteriores, podría permitir a un atacante utilizar una DLL maliciosa para escalar privilegios y llevar a cabo una ejecución de código arbitraria. Un atacante ya debe tener privilegios de usuario en la máquina para explotar esta vulnerabilidad • https://helpcenter.trendmicro.com/en-us/article/TMKA-10180 • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Trend Micro HouseCall for Home Networks (versions below 5.3.0.1063) could be exploited via a DLL Hijack related to a vulnerability on the packer that the program uses. Trend Micro HouseCall for Home Networks (versiones por debajo de 5.3.0.1063), podría ser explotado mediante un secuestro de DLL relacionado con una vulnerabilidad en el empaquetador que el programa utiliza. • https://helpcenter.trendmicro.com/en-us/article/TMKA-21674 • CWE-427: Uncontrolled Search Path Element •