Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro client-server-messaging security 3.6 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-2437
Stack-based buffer overflow in cgiRecvFile.exe in Trend Micro OfficeScan 7.3 patch 4 build 1362 and other builds, OfficeScan 8.0 and 8.0 SP1, and Client Server Messaging Security 3.6 allows remote malicious users to execute arbitrary code via an HTTP request containing a long Com...
Trend Micro Officescan 8.0
Trend Micro Client-server-messaging Security 3.5
Trend Micro Officescan 7.3
Trend Micro Officescan 7.0
Trend Micro Client-server-messaging Security 2.0
Trend Micro Client-server-messaging Security 3.6
Trend Micro Client-server-messaging Security 3.0
NA
CVE-2005-0533
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI prior to 7.510, as used in multiple Trend Micro products, allows remote malicious users to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Trend Micro Control Manager Gold
Trend Micro Interscan Emanager 3.5.2
Trend Micro Interscan Emanager 3.6
Trend Micro Interscan Messaging Security Suite 5.5
Trend Micro Interscan Viruswall 3.5
Trend Micro Interscan Viruswall 3.52
Trend Micro Interscan Viruswall 5.1
Trend Micro Interscan Viruswall Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Interscan Webmanager 1.2
Trend Micro Interscan Webmanager 2.1
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 5.58
Trend Micro Pc-cillin 2000
Trend Micro Scanmail 2.51
Trend Micro Scanmail 3.8
Trend Micro Scanmail 6.1
Trend Micro Scanmail Gold
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Client-server Suite Smb Gold
Trend Micro Interscan Messaging Security Suite Gold
9.8
CVSSv3
CVE-2008-2433
The web management console in Trend Micro OfficeScan 7.0 up to and including 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote malicious users to hijac...
Trendmicro Client Server Messaging Suite 3.5
Trendmicro Client Server Messaging Suite 3.6
Trendmicro Officescan
Trendmicro Worry-free Business Security 5.0
NA
CVE-2007-0851
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote malicious users to execute arbitrary code via a malformed UPX compressed executable.
Trend Micro Control Manager Gold
Trend Micro Interscan Emanager 3.51 J
Trend Micro Interscan Emanager 3.6
Trend Micro Interscan Messaging Security Suite Gold
Trend Micro Interscan Viruswall 3.6
Trend Micro Interscan Viruswall 3.6.0 Build 1182
Trend Micro Interscan Viruswall 3.6.0 Build1166
Trend Micro Interscan Viruswall 3.8.0 Build1130
Trend Micro Interscan Viruswall 3.81
Trend Micro Interscan Viruswall For Windows Nt 3.4
Trend Micro Interscan Viruswall For Windows Nt 3.5
Trend Micro Interscan Web Security Suite
Trend Micro Interscan Web Security Suite Gold
Trend Micro Officescan 3.0
Trend Micro Officescan 4.5.0
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 3.5
Trend Micro Control Manager 2.5.0
Trend Micro Control Manager 3.5
Trend Micro Interscan Emanager 3.5
Trend Micro Interscan Emanager 3.51
Trend Micro Interscan Messaging Security Suite 5.5 Build 1183
NA
CVE-2008-3364
Buffer overflow in the ObjRemoveCtrl Class ActiveX control in OfficeScanRemoveCtrl.dll 7.3.0.1020 in Trend Micro OfficeScan Corp Edition (OSCE) Web-Deployment 7.0, 7.3 build 1343 Patch 4 and other builds, and 8.0; Client Server Messaging Security (CSM) 3.5 and 3.6; and Worry-Free...
Trend Micro Officescan 7.3
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started