Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
scanmail vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2015-3326
Trend Micro ScanMail for Microsoft Exchange (SMEX) 10.2 before Hot Fix Build 3318 and 11.0 before Hot Fix Build 4180 creates session IDs for the web console using a random number generator with predictable values, which makes it easier for remote malicious users to bypass authent...
Trend Micro Scanmail 11.0
Trend Micro Scanmail 10.2
5
CVSSv2
CVE-2004-1003
Trend ScanMail allows remote malicious users to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file.
Trend Micro Scanmail Domino 2.51
Trend Micro Scanmail Domino 2.6
1 EDB exploit
6.4
CVSSv2
CVE-2017-14090
A vulnerability in Trend Micro ScanMail for Exchange 12.0 exists in which some communications to the update servers are not encrypted.
Trendmicro Scanmail 12.0
7.6
CVSSv2
CVE-2017-14091
A vulnerability in Trend Micro ScanMail for Exchange 12.0 exists in which certain specific installations that utilize a uncommon feature - Other Update Sources - could be exploited to overwrite sensitive files in the ScanMail for Exchange directory.
Trendmicro Scanmail 12.0
6.8
CVSSv2
CVE-2017-14092
The absence of Anti-CSRF tokens in Trend Micro ScanMail for Exchange 12.0 web interface forms could allow an malicious user to submit authenticated requests when an authenticated user browses an attacker-controlled domain.
Trendmicro Scanmail 12.0
4.3
CVSSv2
CVE-2017-14093
The Log Query and Quarantine Query pages in Trend Micro ScanMail for Exchange 12.0 are vulnerable to cross site scripting (XSS) attacks.
Trendmicro Scanmail 12.0
7.5
CVSSv2
CVE-2003-1343
Trend Micro ScanMail for Exchange (SMEX) prior to 3.81 and prior to 6.1 might install a back door account in smg_Smxcfg30.exe, which allows remote malicious users to gain access to the web management interface via the vcc parameter, possibly "3560121183d3".
Trend Micro Scanmail
1 EDB exploit
4.6
CVSSv2
CVE-2001-0586
TrendMicro ScanMail for Exchange 3.5 Evaluation allows a local malicious user to recover the administrative credentials for ScanMail via a combination of unprotected registry keys and weakly encrypted passwords.
Trend Micro Scanmail Exchange 3.5
7.5
CVSSv2
CVE-2005-0533
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI prior to 7.510, as used in multiple Trend Micro products, allows remote malicious users to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Trend Micro Control Manager Gold
Trend Micro Interscan Emanager 3.5.2
Trend Micro Interscan Emanager 3.6
Trend Micro Interscan Messaging Security Suite 5.5
Trend Micro Interscan Viruswall 3.5
Trend Micro Interscan Viruswall 3.52
Trend Micro Interscan Viruswall 5.1
Trend Micro Interscan Viruswall Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Interscan Webmanager 1.2
Trend Micro Interscan Webmanager 2.1
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 5.58
Trend Micro Pc-cillin 2000
Trend Micro Scanmail 2.51
Trend Micro Scanmail 3.8
Trend Micro Scanmail 6.1
Trend Micro Scanmail Gold
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Client-server Suite Smb Gold
Trend Micro Interscan Messaging Security Suite Gold
5.1
CVSSv2
CVE-2019-14688
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable duri...
Trendmicro Control Manager 7.0
Trendmicro Endpoint Sensor 1.6
Trendmicro Im Security 1.6.5
Trendmicro Mobile Security 9.8
Trendmicro Officescan Xg
Trendmicro Scanmail 14.0
Trendmicro Security 2019
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-38028
CVE-2024-32406
CVE-2024-25624
IMAP
CVE-2024-2310
CVE-2024-0874
CVE-2024-20359
XXE
remote code execution
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »