Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
rod boron vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-1343
Trend Micro ScanMail for Exchange (SMEX) prior to 3.81 and prior to 6.1 might install a back door account in smg_Smxcfg30.exe, which allows remote malicious users to gain access to the web management interface via the vcc parameter, possibly "3560121183d3".
Trend Micro Scanmail
1 EDB exploit
NA
CVE-2003-1344
Trend Micro Virus Control System (TVCS) Log Collector allows remote malicious users to obtain usernames, encrypted passwords, and other sensitive information via a URL request for getservers.exe with the action parameter set to "selects1", which returns log files.
Trend Micro Virus Control System
1 EDB exploit
NA
CVE-2003-1341
The default installation of Trend Micro OfficeScan 3.0 up to and including 3.54 and 5.x allows remote malicious users to bypass authentication from cgiChkMasterPasswd.exe and gain access to the web management console via a direct request to cgiMasterPwd.exe.
Trend Micro Officescan 3.1.1
Trend Micro Officescan 3.13
Trend Micro Officescan 3.5
Trend Micro Officescan 3.0
Trend Micro Officescan 3.54
Trend Micro Officescan 3.11
Trend Micro Virus Buster 3.52
Trend Micro Virus Buster 3.53
Trend Micro Virus Buster 3.54
1 EDB exploit
NA
CVE-2003-1342
Trend Micro Virus Control System (TVCS) 1.8 running with IIS allows remote malicious users to cause a denial of service (memory consumption) in IIS via multiple URL requests for ActiveSupport.exe.
Trend Micro Virus Control System 1.8
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3380
CVE-2024-1694
local file inclusion
CVE-2024-5645
CVE-2024-24919
XSS
CVE-2024-36774
CVE-2024-21306
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started