Trend Micro Virus Control System (TVCS) Log Collector allows remote attackers to obtain usernames, encrypted passwords, and other sensitive information via a URL request for getservers.exe with the action parameter set to "selects1", which returns log files.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
http://secunia.com/advisories/7881 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/11063 | vdb entry |
http://www.securityfocus.com/bid/6618 | vdb entry exploit |
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0021.html | mailing list |