Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
officescan vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2004-2430
Trend OfficeScan Corporate Edition 5.58 and possibly earler does not drop privileges when opening a help window from a virus detection pop-up window, which allows local users to gain SYSTEM privileges.
Trend Micro Officescan 3.0
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.54
Trend Micro Officescan Corporate 5.02
Trend Micro Officescan Corporate 5.5
Trend Micro Officescan Corporate 5.58
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 3.5
4.6
CVSSv2
CVE-2004-2006
Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection.
Trend Micro Officescan 3.0
Trend Micro Officescan Corporate 5.02
Trend Micro Officescan Corporate 5.58
Trend Micro Officescan Corporate 3.5
Trend Micro Officescan Corporate 3.54
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.13
5
CVSSv2
CVE-2006-5212
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 prior to 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 prior to 6.5.0.1418, 7.0 prior to 7.0.0.1257, and 7.3 prior to 7.3.0.1053 allow remote malicious users to delete files via a modified fil...
Trend Micro Officescan 6.0
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 7.0
Trend Micro Officescan Corporate 7.3
5
CVSSv2
CVE-2019-18187
Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE...
Trendmicro Officescan Xg
Trendmicro Officescan 11.0
4
CVSSv2
CVE-2017-5481
Trend Micro OfficeScan 11.0 before SP1 CP 6325 and XG before CP 1352 allows remote authenticated users to gain privileges by leveraging a leak of an encrypted password during a web-console operation.
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
6.8
CVSSv2
CVE-2017-14084
A potential Man-in-the-Middle (MitM) attack vulnerability in Trend Micro OfficeScan 11.0 and XG may allow malicious users to execute arbitrary code on vulnerable installations.
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
1 EDB exploit
7.8
CVSSv2
CVE-2017-14086
Pre-authorization Start Remote Process vulnerabilities in Trend Micro OfficeScan 11.0 and XG may allow unauthenticated users who can access the OfficeScan server to start the fcgiOfcDDA.exe executable or cause a potential INI corruption, which may cause the server disk space to b...
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
1 EDB exploit
5
CVSSv2
CVE-2017-14087
A Host Header Injection vulnerability in Trend Micro OfficeScan XG (12.0) may allow an malicious user to spoof a particular Host header, allowing the malicious user to render arbitrary links that point to a malicious website with poisoned Host header webpages.
Trendmicro Officescan 11.0
Trendmicro Officescan 12.0
1 EDB exploit
7.5
CVSSv2
CVE-2017-14089
An Unauthorized Memory Corruption vulnerability in Trend Micro OfficeScan 11.0 and XG may allow remote unauthenticated users who can access the OfficeScan server to target cgiShowClientAdm.exe and cause memory corruption issues.
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
1 EDB exploit
4.6
CVSSv2
CVE-2019-9492
A DLL side-loading vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow an authenticated malicious user to gain code execution and terminate the product's process - disabling endpoint protection. The attacker must have already gained authentication and have lo...
Trendmicro Officescan 11.0
Trendmicro Officescan Xg
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
firmware
CVE-2006-4304
CVE-2024-32878
CVE-2024-31502
XSS
CVE-2024-3059
CVE-2024-33692
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »