Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro control manager 2.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-2998
SQL injection vulnerability in the ad hoc query module in Trend Micro Control Manager (TMCM) prior to 5.5.0.1823 and 6.0 prior to 6.0.0.1449 allows remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Trend Micro Control Manager 2.1
Trend Micro Control Manager 5.0
Trend Micro Control Manager 2.5
Trend Micro Control Manager 3.0
Trend Micro Control Manager 3.5
Trend Micro Control Manager 2.0
Trend Micro Control Manager 6.0
Trend Micro Control Manager
Trend Micro Control Manager 5.5
1 EDB exploit
NA
CVE-2005-0533
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI prior to 7.510, as used in multiple Trend Micro products, allows remote malicious users to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Trend Micro Interscan Emanager 3.5.2
Trend Micro Scanmail 3.81
Trend Micro Serverprotect 2.5
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.0
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Interscan Viruswall 3.52
Trend Micro Interscan Viruswall 3.5
Trend Micro Interscan Viruswall 3.4
Trend Micro Serverprotect 1.3
Trend Micro Interscan Viruswall Gold
Trend Micro Scanmail Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Interscan Viruswall 3.52 Build1466
Trend Micro Interscan Emanager 3.6
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 5.02
Trend Micro Scanmail 2.51
Trend Micro Scanmail 6.1
Trend Micro Interscan Webmanager 1.2
NA
CVE-2007-0851
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote malicious users to execute arbitrary code via a malformed UPX compressed executable.
Trend Micro Interscan Emanager 3.5.2
Trend Micro Scanmail 3.81
Trend Micro Pc Cillin - Internet Security 2006
Trend Micro Interscan Viruswall 3.7.0
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 3.11
Trend Micro Interscan Viruswall For Windows Nt 3.6
Trend Micro Officescan Corporate 3.0
Trend Micro Interscan Viruswall 3.2.3
Trend Micro Interscan Viruswall 3.81
Trend Micro Portalprotect 1.2
Trend Micro Interscan Viruswall Gold
Trend Micro Officescan Corporate 7.0
Trend Micro Scanmail Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Serverprotect 5.5.8
Trend Micro Control Manager 2.5.0
Trend Micro Interscan Viruswall 3.7.0 Build1190
Trend Micro Interscan Emanager 3.6
Trend Micro Officescan Corporate 3.13
Trend Micro Interscan Viruswall 3.8.0 Build1130
7.2
CVSSv3
CVE-2020-8602
A vulnerability in the management consoles of Trend Micro Deep Security 10.0-12.0 and Trend Micro Vulnerability Protection 2.0 SP2 may allow an authenticated attacker with full control privileges to bypass file integrity checks, leading to remote code execution.
Trendmicro Deep Security Manager 10.0
Trendmicro Deep Security Manager 11.0
Trendmicro Deep Security Manager 12.0
Trendmicro Vulnerability Protection 2.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started