what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 64 RSS Feed

Files

trendmicro-activex.txt
Posted Jul 29, 2008
Authored by Elazar Broad

OfficeScan versions 7.3 build 1343 Patch 4 and below from Trend Micro suffer from an ActiveX related buffer overflow vulnerability.

tags | advisory, overflow, activex
SHA-256 | 0c2b50cf8236ae8bf547a71005cc9d2fd221cd85aa987b33776ee4ecb0137c00

Related Files

Trend Micro Web Security Remote Code Execution
Posted Jul 14, 2020
Authored by Mehmet Ince | Site metasploit.com

This Metasploit module exploits multiple vulnerabilities together in order to achieve remote code execution in Trend Micro Web Security versions prior to 6.5 SP2 Patch 4 (Build 1901).

tags | exploit, remote, web, vulnerability, code execution
advisories | CVE-2020-8604, CVE-2020-8605, CVE-2020-8606
SHA-256 | 9664c9cbae3eb80a568d35406cf2acc152b6130f2cb92627857e239b45ba2249
Trend Micro Web Security (Virtual Appliance) Remote Code Execution
Posted Jun 22, 2020
Authored by Mehmet Ince | Site metasploit.com

This Metasploit module exploits multiple vulnerabilities together in order to achieve a remote code execution. Unauthenticated users can execute a terminal command under the context of the root user. The specific flaw exists within the LogSettingHandler class of administrator interface software. When parsing the mount_device parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. But authentication is required to exploit this vulnerability. Another specific flaw exist within the proxy service, which listens on port 8080 by default. Unauthenticated users can exploit this vulnerability in order to communicate with internal services in the product. Last but not least a flaw exists within the Apache Solr application, which is installed within the product. When parsing the file parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the IWSS user. Due to combination of these vulnerabilities, unauthenticated users can execute a terminal command under the context of the root user. Version prior to 6.5 SP2 Patch 4 (Build 1901) are affected.

tags | exploit, remote, root, vulnerability, code execution
advisories | CVE-2020-8604, CVE-2020-8605, CVE-2020-8606
SHA-256 | 4aee71179ce97ff14964220e5add145f6a56bc5f34e2d1ffa3729b6a8b812d7c
Trend Micro Deep Security Agent 11 Arbitrary File Overwrite
Posted Dec 6, 2019
Authored by Peter Lapp

Trend Micro Deep Security Agent 11 suffers from an arbitrary file overwrite vulnerability.

tags | exploit, arbitrary
advisories | CVE-2019-15627
SHA-256 | 893eaef24a4ca96041577727c07da9c8823de03e147d276420609d0067521440
OfficeScan XG 11.0 Unauthorized Change Prevention Bypass
Posted Jun 8, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

OfficeScan XG version 11.0 suffers from an unauthorized change prevention bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2018-10507
SHA-256 | 32dc9c5686796d41853c8b27d1d4b50ef583c060f39f37106a3843b56056a2a3
Trend Micro InterScan Messaging Security (Virtual Appliance) Remote Code Execution
Posted Oct 12, 2017
Authored by mr_me, Mehmet Ince | Site metasploit.com

This Metasploit module exploits the authentication bypass and command injection vulnerability together. Unauthenticated users can execute a terminal command under the context of the web server user. The specific flaw exists within the management interface, which listens on TCP port 443 by default. Trend Micro IMSVA product have widget feature which is implemented with PHP. Insecurely configured web server exposes diagnostic.log file, which leads to an extraction of JSESSIONID value from administrator session. Proxy.php files under the mod TMCSS folder takes multiple parameter but the process does not properly validate a user-supplied string before using it to execute a system call. Due to combination of these vulnerabilities, unauthenticated users can execute a terminal command under the context of the web server user.

tags | exploit, web, php, tcp, vulnerability
SHA-256 | a28a0e405c43d1d9d228e28261a5e904e2adcd99280b5dee750ba1116cc84e02
Trend Micro OfficeScan Remote Code Execution
Posted Oct 10, 2017
Authored by mr_me, Mehmet Ince | Site metasploit.com

This Metasploit module exploits the authentication bypass and command injection vulnerability together. Unauthenticated users can execute a terminal command under the context of the web server user. The specific flaw exists within the management interface, which listens on TCP port 443 by default. The Trend Micro Officescan product has a widget feature which is implemented with PHP. Talker.php takes ack and hash parameters but doesn't validate these values, which leads to an authentication bypass for the widget. Proxy.php files under the mod TMCSS folder take multiple parameters but the process does not properly validate a user-supplied string before using it to execute a system call. Due to combination of these vulnerabilities, unauthenticated users can execute a terminal command under the context of the web server user.

tags | exploit, web, php, tcp, vulnerability
SHA-256 | 533339b2e9cfb58d88fe79c7a17a4f87348ca31165bf2459d2e7dc2caa154258
TrendMicro OfficeScan 11.0 / XG (12.0) Memory Corruption
Posted Oct 1, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a memory corruption vulnerability.

tags | exploit
advisories | CVE-2017-14089
SHA-256 | a3e63e809dd2f77a9acd338ac38043b79c71b205a4ebbe5fafecd0186aff1ce4
TrendMicro OfficeScan 11.0 / XG (12.0) Host Header Injection
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a host header injection vulnerability.

tags | exploit
advisories | CVE-2017-14087
SHA-256 | ca851dfdc30f3ca29be4beb58fda82f5431c4b58b939a638be47b4f47458dc25
TrendMicro OfficeScan 11.0 / XG (12.0) Server-Side Request Forgery
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a server-side request forgery vulnerability.

tags | exploit
SHA-256 | b78a20a2c968c75631e6990a1f7e972c823b375e7d86ef59f2be61b0a46109c1
TrendMicro OfficeScan 11.0 / XG (12.0) Information Disclosure
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from NT domain and PHP information disclosure vulnerabilities.

tags | exploit, php, vulnerability, info disclosure
advisories | CVE-2017-14085
SHA-256 | cbc24777efe60d495308e8e83b6aab3977c7f4ca4be577179c3bb0fd8a7ebf53
TrendMicro OfficeScan 11.0 / XG (12.0) Auth Start Code Execution
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from Start Remote Process code execution and denial of service vulnerabilities.

tags | exploit, remote, denial of service, vulnerability, code execution
advisories | CVE-2017-14086
SHA-256 | 6de08e124c8b1a0239b20e4fa1c2cbdf3e13a51ade31822cc0daeada5571141c
TrendMicro OfficeScan 11.0 / XG (12.0) Man-In-The-Middle
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a curl man-in-the-middle remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2017-14084
SHA-256 | a951ff568b5eb974a3fcb41787cccb1e6f0712ff17d8f8b55fbbe1162c616bf1
TrendMicro OfficeScan 11.0 / XG (12.0) XG Image File Execution Bypass
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from an XG image file execution bypass vulnerability.

tags | exploit, bypass
SHA-256 | 39feeb31db761809500aabac33bb9d824e3646b7a52d3c8c0735f44deefaf200
TrendMicro OfficeScan 11.0 / XG (12.0) Encryption Key Disclosure
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a pre-authentication encryption key disclosure vulnerability.

tags | exploit
advisories | CVE-2017-14083
SHA-256 | 0300820dbf3c570f226bdcebb695752c98f73528c93322e27eaac142ce6d9feb
Trend Micro Threat Discovery Appliance admin_sys_time.cgi Remote Command Execution
Posted Apr 19, 2017
Authored by Roberto Suggi Liverani, mr_me | Site metasploit.com

This Metasploit module exploits two vulnerabilities the Trend Micro Threat Discovery Appliance. The first is an authentication bypass vulnerability via a file delete in logoff.cgi which resets the admin password back to 'admin' upon a reboot (CVE-2016-7552). The second is a cmd injection flaw using the timezone parameter in the admin_sys_time.cgi interface (CVE-2016-7547).

tags | exploit, cgi, vulnerability, bypass
advisories | CVE-2016-7547, CVE-2016-7552
SHA-256 | 035399021ac947492b961a04ac25a5a12f67bebc47e9858ba91b9e72dfccdc17
Trend Micro Enterprise Mobile Security Android Application Man-In-The-Middle
Posted Mar 30, 2017
Authored by David Coomber

The Trend Micro Enterprise Mobile Security android application suffers from a man-in-the-middle SSL certificate vulnerability.

tags | advisory
advisories | CVE-2016-9319
SHA-256 | 3be0a3916b23746808c0c776f1e66acee4ee7df205c6f4e4557903bacd4c08eb
Trend Micro Smart Protection Server Exec Remote Code Injection
Posted Nov 15, 2016
Authored by Quentin Kaiser | Site metasploit.com

This Metasploit module exploits a vulnerability found in TrendMicro Smart Protection Server where untrusted inputs are fed to ServWebExec system command, leading to command injection. Please note: authentication is required to exploit this vulnerability.

tags | exploit
SHA-256 | c0669d4763a8b0f7006a57298e45c4f523d05ca9e7d1a8c304ef6ed3cde57c5f
TrendMicro InterScan Web Security Virtual Appliance Shellshock
Posted Oct 22, 2016
Authored by Hacker Fantastic

TrendMicro InterScan Web Security Virtual Appliance remote code execution exploit that leverages the shellshock vulnerability to spawn a connect-back shell. TrendMicro has contacted Packet Storm and provided the following link with patch information: <a href="https://success.trendmicro.com/solution/1105233">https://success.trendmicro.com/solution/1105233</a>

tags | exploit, remote, web, shell, code execution
advisories | CVE-2014-6271
SHA-256 | 7eefbb330b7be36adf17cb7725410f679d2aeac775a9e31cf85234029e4b66cc
Trend Micro Deep Discovery Inspector 3.7 / 3.8 CSRF
Posted Mar 28, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Trend Micro Deep Discovery versions 3.7 and 3.8 suffer from multiple cross site request forgery vectors. If an authenticated user visits a malicious webpage attackers will have ability to modify many settings of the Deep Discovery application to that of the attackers choosing.

tags | exploit, csrf
SHA-256 | 4fcbc0ecd161f07f84b6f494716b66c2911b8b6d48a5b8ad3ba321fb4be6f363
Trend Micro DLL Hijacking
Posted Dec 31, 2015
Authored by Stefan Kanthak

TrendMicro_MAX_10.0_US-en_Downloader.exe loads and executes ProfAPI.dll and UXTheme.dll (and other DLLs too) eventually found in the directory it is started from.

tags | exploit
systems | windows
SHA-256 | c0671e37659541c6c0bbbb19381f144e24a52d8a638e4bc161e8a1032ac09225
Trend Micro DirectPass 1.5.0.1060 Command Injection / Denial Of Service
Posted May 21, 2013
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

Trend Micro DirectPass 1.5.0.1060 suffers from local command/path injection, persistent code injection, and a denial of service vulnerability.

tags | exploit, denial of service, local, code execution
SHA-256 | 0bd4cb7f71fd9f6ce6c2774f8d033e3486c4b9de01400c5a1430a846c73e58c3
Trend Micro InterScan Messaging Security Suite XSS / CSRF
Posted Sep 15, 2012
Authored by modpr0be

Trend Micro InterScan Messaging Security Suite suffers from stored cross site scripting and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2012-2995, CVE-2012-2996
SHA-256 | d86efa1d88ecdbb7560b3e29adb1a12d5b6a2953d61809ccae4d56fd757440dc
TrendMicro Control Manager 5.5 Buffer Overflow
Posted Feb 24, 2012
Authored by blue, Luigi Auriemma | Site metasploit.com

This Metasploit module exploits a vulnerability in the CmdProcessor.exe component of Trend Micro Control Manager up to version 5.5. The specific flaw exists within CmdProcessor.exe service running on TCP port 20101. The vulnerable function is the CGenericScheduler::AddTask function of cmdHandlerRedAlertController.dll. When processing a specially crafted IPC packet, controlled data is copied into a 256-byte stack buffer. This can be exploited to execute remote code under the context of the user.

tags | exploit, remote, tcp
advisories | CVE-2011-5001, OSVDB-77585
SHA-256 | a04483c90d2ea44a263aa576ce03bb6bfbcf03f1fa5d6ff7e8b522c7b58f3163
Trend Micro Titanium Maximum Security 2011 Local Exploit
Posted Nov 2, 2010
Authored by Nikita Tarakanov

Trend Micro Titanium Maximum Security 2011 local kernel exploit.

tags | exploit, kernel, local
SHA-256 | 41ae2da1a23fdf3762a7621107424dc976249cd0b79f4c34c0438d8d2ac15510
Trend Micro Internet Security Pro 2010 ActiveX extSetOwner() Remote Code Execution
Posted Oct 1, 2010
Authored by Trancer | Site metasploit.com

This Metasploit module exploits a remote code execution vulnerability in Trend Micro Internet Security Pro 2010 ActiveX. When sending an invalid pointer to the extSetOwner() function of UfPBCtrl.dll an attacker may be able to execute arbitrary code.

tags | exploit, remote, arbitrary, code execution, activex
advisories | CVE-2010-3189
SHA-256 | c2a11c7983f91db8ab886e7660b02d16e3345e1caecf8da45a9e658400a2913f
Page 1 of 3
Back123Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close