Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro officescan corporate edition vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-5211
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 prior to 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 prior to 6.5.0.1418, 7.0 prior to 7.0.0.1257, and 7.3 prior to 7.3.0.1053 allow remote malicious users to remove OfficeScan clients via a...
Trend Micro Officescan Corporate Edition 6.5
Trend Micro Officescan Corporate Edition 7.0
Trend Micro Officescan Corporate Edition 7.3
NA
CVE-2007-0325
Multiple buffer overflows in the Trend Micro OfficeScan Web-Deployment SetupINICtrl ActiveX control in OfficeScanSetupINI.dll, as used in OfficeScan 7.0 before Build 1344, OfficeScan 7.3 before Build 1241, and Client / Server / Messaging Security 3.0 before Build 1197, allow remo...
Trend Micro Officescan Corporate Edition 7.3
Trend Micro Client-server-messaging Security 3.0
Trend Micro Officescan Corporate Edition 7.0
1 EDB exploit
NA
CVE-2008-1365
Stack-based buffer overflow in Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and previous versions, and 7.3 Patch 3 build 1314 and previous versions, allows remote malicious users to execute arbitrary code or cause a denial of service (crash) via a long encrypte...
Trend Micro Officescan Corporate Edition
2 EDB exploits
NA
CVE-2008-1366
Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and previous versions, and 7.3 Patch 3 build 1314 and previous versions, allows remote malicious users to cause a denial of service (process consumption) via (1) an HTTP request without a Content-Length header or (2)...
Trend Micro Officescan Corporate Edition
NA
CVE-2004-2430
Trend OfficeScan Corporate Edition 5.58 and possibly earler does not drop privileges when opening a help window from a virus detection pop-up window, which allows local users to gain SYSTEM privileges.
Trend Micro Officescan 3.0
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.54
Trend Micro Officescan Corporate 5.02
Trend Micro Officescan Corporate 5.5
Trend Micro Officescan Corporate 5.58
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 3.5
NA
CVE-2006-5212
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 prior to 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 prior to 6.5.0.1418, 7.0 prior to 7.0.0.1257, and 7.3 prior to 7.3.0.1053 allow remote malicious users to delete files via a modified fil...
Trend Micro Officescan 6.0
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 7.0
Trend Micro Officescan Corporate 7.3
NA
CVE-2000-0204
The Trend Micro OfficeScan client allows remote malicious users to cause a denial of service by making 5 connections to port 12345, which raises CPU utilization to 100%.
Trend Micro Officescan 3.5
1 EDB exploit
NA
CVE-2007-3454
Stack-based buffer overflow in CGIOCommon.dll prior to 8.0.0.1042 in Trend Micro OfficeScan Corporate Edition 8.0 allows remote malicious users to execute arbitrary code via long crafted requests, as demonstrated using a long session cookie to unspecified CGI programs that use th...
Trend Micro Officescan 8.0
Trend Micro Officescan 7.3
NA
CVE-2001-1150
Vulnerability in cgiWebupdate.exe in Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.5.2 up to and including 3.5.4 allows remote malicious users to read arbitrary files.
Trend Micro Officescan Corporate 3.54
Trend Micro Virus Buster Corporate 3.52
Trend Micro Virus Buster Corporate 3.53
Trend Micro Virus Buster Corporate 3.54
Trend Micro Officescan Corporate 3.5
NA
CVE-2001-1151
Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.53 allows remote malicious users to access sensitive information from the hotdownload directory without authentication, such as the ofcscan.ini configuration file, which contains a weakly encrypted password.
Trend Micro Virus Buster Corporate 3.53
Trend Micro Officescan Corporate 3.53
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »