cvelist/2010/3xxx/CVE-2010-3189.json
2019-03-17 23:39:58 +00:00

97 lines
3.4 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-3189",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The extSetOwner function in the UfProxyBrowserCtrl ActiveX control (UfPBCtrl.dll) in Trend Micro Internet Security Pro 2010 allows remote attackers to execute arbitrary code via an invalid address that is dereferenced as a pointer."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-10-165",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-10-165"
},
{
"name": "20100825 ZDI-10-165: Trend Micro Internet Security Pro 2010 ActiveX extSetOwner Remote Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/513327/100/0/threaded"
},
{
"name": "1024364",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1024364"
},
{
"name": "oval:org.mitre.oval:def:7633",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7633"
},
{
"name": "41140",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41140"
},
{
"name": "ADV-2010-2185",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/2185"
},
{
"name": "trend-micro-activex-code-execution(61397)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61397"
},
{
"name": "http://esupport.trendmicro.com/pages/Hot-Fix-UfPBCtrldll-is-vulnerable-to-remote-attackers.aspx",
"refsource": "CONFIRM",
"url": "http://esupport.trendmicro.com/pages/Hot-Fix-UfPBCtrldll-is-vulnerable-to-remote-attackers.aspx"
}
]
}
}