Deserialization vulnerability in Microsoft Exchange MeetingPollProposeOptionsPayload.GetRequests() method. This method can be triggered with an HTTP request and with a specially crafted XML payload it can lead to OS command execution within the context of the w3wp.exe process which has SYSTEM level privileges.



The XML payload is a .NET serialized object which contains the DataContractSerializer formatter and, it may contain the ObjectDataProvider chain from YSoSerial.NET; although other chains can be used. The payload needs to be crafted to be compatible with the way in which Exchange deserializes it.
This module exploits two vulnerabilities in Trend Micro Threat Discovery Appliance.



The first is an authentication bypass vulnerability via a file delete in logoff.cgi which resets the admin password back to 'admin' upon a reboot. This is useful if the password for the admin user is unknown.



The second is an authenticated command injection flaw using the timezone parameter in the admin_sys_time.cgi interface.
The Symantec Web Gateway Management Console before 5.2.5 allows some specially crafted entries to update the whitelist without validation. A lower-privileged but authorized management console user can bypass the whitelist validation using a specifically-modified script to create an unauthorized whitelist entry. This whitelist entry could potentially be leveraged in further malicious attempts against the network.