OfficeScan versions 7.3 build 1343 Patch 4 and below from Trend Micro suffer from an ActiveX related buffer overflow vulnerability.
0c2b50cf8236ae8bf547a71005cc9d2fd221cd85aa987b33776ee4ecb0137c00
This Metasploit module exploits multiple vulnerabilities together in order to achieve remote code execution in Trend Micro Web Security versions prior to 6.5 SP2 Patch 4 (Build 1901).
9664c9cbae3eb80a568d35406cf2acc152b6130f2cb92627857e239b45ba2249
This Metasploit module exploits multiple vulnerabilities together in order to achieve a remote code execution. Unauthenticated users can execute a terminal command under the context of the root user. The specific flaw exists within the LogSettingHandler class of administrator interface software. When parsing the mount_device parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. But authentication is required to exploit this vulnerability. Another specific flaw exist within the proxy service, which listens on port 8080 by default. Unauthenticated users can exploit this vulnerability in order to communicate with internal services in the product. Last but not least a flaw exists within the Apache Solr application, which is installed within the product. When parsing the file parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the IWSS user. Due to combination of these vulnerabilities, unauthenticated users can execute a terminal command under the context of the root user. Version prior to 6.5 SP2 Patch 4 (Build 1901) are affected.
4aee71179ce97ff14964220e5add145f6a56bc5f34e2d1ffa3729b6a8b812d7c
Trend Micro Deep Security Agent 11 suffers from an arbitrary file overwrite vulnerability.
893eaef24a4ca96041577727c07da9c8823de03e147d276420609d0067521440
OfficeScan XG version 11.0 suffers from an unauthorized change prevention bypass vulnerability.
32dc9c5686796d41853c8b27d1d4b50ef583c060f39f37106a3843b56056a2a3
This Metasploit module exploits the authentication bypass and command injection vulnerability together. Unauthenticated users can execute a terminal command under the context of the web server user. The specific flaw exists within the management interface, which listens on TCP port 443 by default. Trend Micro IMSVA product have widget feature which is implemented with PHP. Insecurely configured web server exposes diagnostic.log file, which leads to an extraction of JSESSIONID value from administrator session. Proxy.php files under the mod TMCSS folder takes multiple parameter but the process does not properly validate a user-supplied string before using it to execute a system call. Due to combination of these vulnerabilities, unauthenticated users can execute a terminal command under the context of the web server user.
a28a0e405c43d1d9d228e28261a5e904e2adcd99280b5dee750ba1116cc84e02
This Metasploit module exploits the authentication bypass and command injection vulnerability together. Unauthenticated users can execute a terminal command under the context of the web server user. The specific flaw exists within the management interface, which listens on TCP port 443 by default. The Trend Micro Officescan product has a widget feature which is implemented with PHP. Talker.php takes ack and hash parameters but doesn't validate these values, which leads to an authentication bypass for the widget. Proxy.php files under the mod TMCSS folder take multiple parameters but the process does not properly validate a user-supplied string before using it to execute a system call. Due to combination of these vulnerabilities, unauthenticated users can execute a terminal command under the context of the web server user.
533339b2e9cfb58d88fe79c7a17a4f87348ca31165bf2459d2e7dc2caa154258
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a memory corruption vulnerability.
a3e63e809dd2f77a9acd338ac38043b79c71b205a4ebbe5fafecd0186aff1ce4
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a host header injection vulnerability.
ca851dfdc30f3ca29be4beb58fda82f5431c4b58b939a638be47b4f47458dc25
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a server-side request forgery vulnerability.
b78a20a2c968c75631e6990a1f7e972c823b375e7d86ef59f2be61b0a46109c1
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from NT domain and PHP information disclosure vulnerabilities.
cbc24777efe60d495308e8e83b6aab3977c7f4ca4be577179c3bb0fd8a7ebf53
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from Start Remote Process code execution and denial of service vulnerabilities.
6de08e124c8b1a0239b20e4fa1c2cbdf3e13a51ade31822cc0daeada5571141c
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a curl man-in-the-middle remote code execution vulnerability.
a951ff568b5eb974a3fcb41787cccb1e6f0712ff17d8f8b55fbbe1162c616bf1
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from an XG image file execution bypass vulnerability.
39feeb31db761809500aabac33bb9d824e3646b7a52d3c8c0735f44deefaf200
TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a pre-authentication encryption key disclosure vulnerability.
0300820dbf3c570f226bdcebb695752c98f73528c93322e27eaac142ce6d9feb
This Metasploit module exploits two vulnerabilities the Trend Micro Threat Discovery Appliance. The first is an authentication bypass vulnerability via a file delete in logoff.cgi which resets the admin password back to 'admin' upon a reboot (CVE-2016-7552). The second is a cmd injection flaw using the timezone parameter in the admin_sys_time.cgi interface (CVE-2016-7547).
035399021ac947492b961a04ac25a5a12f67bebc47e9858ba91b9e72dfccdc17
The Trend Micro Enterprise Mobile Security android application suffers from a man-in-the-middle SSL certificate vulnerability.
3be0a3916b23746808c0c776f1e66acee4ee7df205c6f4e4557903bacd4c08eb
This Metasploit module exploits a vulnerability found in TrendMicro Smart Protection Server where untrusted inputs are fed to ServWebExec system command, leading to command injection. Please note: authentication is required to exploit this vulnerability.
c0669d4763a8b0f7006a57298e45c4f523d05ca9e7d1a8c304ef6ed3cde57c5f
TrendMicro InterScan Web Security Virtual Appliance remote code execution exploit that leverages the shellshock vulnerability to spawn a connect-back shell. TrendMicro has contacted Packet Storm and provided the following link with patch information: <a href="https://success.trendmicro.com/solution/1105233">https://success.trendmicro.com/solution/1105233</a>
7eefbb330b7be36adf17cb7725410f679d2aeac775a9e31cf85234029e4b66cc
Trend Micro Deep Discovery versions 3.7 and 3.8 suffer from multiple cross site request forgery vectors. If an authenticated user visits a malicious webpage attackers will have ability to modify many settings of the Deep Discovery application to that of the attackers choosing.
4fcbc0ecd161f07f84b6f494716b66c2911b8b6d48a5b8ad3ba321fb4be6f363
TrendMicro_MAX_10.0_US-en_Downloader.exe loads and executes ProfAPI.dll and UXTheme.dll (and other DLLs too) eventually found in the directory it is started from.
c0671e37659541c6c0bbbb19381f144e24a52d8a638e4bc161e8a1032ac09225
Trend Micro DirectPass 1.5.0.1060 suffers from local command/path injection, persistent code injection, and a denial of service vulnerability.
0bd4cb7f71fd9f6ce6c2774f8d033e3486c4b9de01400c5a1430a846c73e58c3
Trend Micro InterScan Messaging Security Suite suffers from stored cross site scripting and cross site request forgery vulnerabilities.
d86efa1d88ecdbb7560b3e29adb1a12d5b6a2953d61809ccae4d56fd757440dc
This Metasploit module exploits a vulnerability in the CmdProcessor.exe component of Trend Micro Control Manager up to version 5.5. The specific flaw exists within CmdProcessor.exe service running on TCP port 20101. The vulnerable function is the CGenericScheduler::AddTask function of cmdHandlerRedAlertController.dll. When processing a specially crafted IPC packet, controlled data is copied into a 256-byte stack buffer. This can be exploited to execute remote code under the context of the user.
a04483c90d2ea44a263aa576ce03bb6bfbcf03f1fa5d6ff7e8b522c7b58f3163
Trend Micro Titanium Maximum Security 2011 local kernel exploit.
41ae2da1a23fdf3762a7621107424dc976249cd0b79f4c34c0438d8d2ac15510
This Metasploit module exploits a remote code execution vulnerability in Trend Micro Internet Security Pro 2010 ActiveX. When sending an invalid pointer to the extSetOwner() function of UfPBCtrl.dll an attacker may be able to execute arbitrary code.
c2a11c7983f91db8ab886e7660b02d16e3345e1caecf8da45a9e658400a2913f