5 results (0.004 seconds)

CVSS: 7.2EPSS: 1%CPEs: 5EXPL: 0

27 Aug 2020 — A vulnerability in the management consoles of Trend Micro Deep Security 10.0-12.0 and Trend Micro Vulnerability Protection 2.0 SP2 may allow an authenticated attacker with full control privileges to bypass file integrity checks, leading to remote code execution. Una vulnerabilidad en las consolas de administración de Trend Micro Deep Security versiones 10.0-12.0 y Trend Micro Vulnerability Protection versión 2.0 SP2, puede permitir a un atacante autenticado con privilegios de control total omitir las compro... • https://success.trendmicro.com/solution/000252039 •

CVSS: 8.1EPSS: 3%CPEs: 5EXPL: 0

27 Aug 2020 — If LDAP authentication is enabled, an LDAP authentication bypass vulnerability in Trend Micro Vulnerability Protection 2.0 SP2 could allow an unauthenticated attacker with prior knowledge of the targeted organization to bypass manager authentication. Enabling multi-factor authentication prevents this attack. Installations using manager native authentication or SAML authentication are not impacted by this vulnerability. Si la autenticación LDAP está habilitada, una vulnerabilidad de omisión de autenticación ... • https://success.trendmicro.com/solution/000252039 • CWE-287: Improper Authentication •

CVSS: 8.1EPSS: 3%CPEs: 5EXPL: 0

21 Aug 2020 — If LDAP authentication is enabled, an LDAP authentication bypass vulnerability in Trend Micro Deep Security 10.x-12.x could allow an unauthenticated attacker with prior knowledge of the targeted organization to bypass manager authentication. Enabling multi-factor authentication prevents this attack. Installations using manager native authentication or SAML authentication are not impacted by this vulnerability. Si la autenticación LDAP está habilitada, una vulnerabilidad de omisión de autenticación LDAP en T... • https://success.trendmicro.com/solution/000252039 • CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

20 Feb 2020 — Trend Micro Vulnerability Protection 2.0 is affected by a vulnerability that could allow an attack to use the product installer to load other DLL files located in the same directory. Trend Micro Vulnerability Protection versión 2.0, está afectado por una vulnerabilidad que podría permitir que un ataque use el instalador del producto para cargar otros archivos DLL localizados en el mismo directorio. • https://success.trendmicro.com/solution/000241963 • CWE-427: Uncontrolled Search Path Element •

CVSS: 4.9EPSS: 0%CPEs: 30EXPL: 0

11 Sep 2019 — Trend Micro Deep Security Manager (10.x, 11.x) and Vulnerability Protection (2.0) are vulnerable to a XML External Entity Attack. However, for the attack to be possible, the attacker must have root/admin access to a protected host which is authorized to communicate with the Deep Security Manager (DSM). Trend Micro Deep Security Manager (versiones 10.x, 11.x) y Vulnerability Protection (versión 2.0) son vulnerables a un ataque de tipo XML External Entity. Sin embargo, para que el ataque sea posible, el ataca... • https://success.trendmicro.com/solution/1122900 • CWE-611: Improper Restriction of XML External Entity Reference •