Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro officescan 7.0 vulnerabilities and exploits
(subscribe to this query)
7
CVSSv3
CVE-2019-14688
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable duri...
Trendmicro Control Manager 7.0
Trendmicro Endpoint Sensor 1.6
Trendmicro Im Security 1.6.5
Trendmicro Mobile Security 9.8
Trendmicro Officescan Xg
Trendmicro Scanmail 14.0
Trendmicro Security 2019
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect 6.0
NA
CVE-2008-2437
Stack-based buffer overflow in cgiRecvFile.exe in Trend Micro OfficeScan 7.3 patch 4 build 1362 and other builds, OfficeScan 8.0 and 8.0 SP1, and Client Server Messaging Security 3.6 allows remote malicious users to execute arbitrary code via an HTTP request containing a long Com...
Trend Micro Officescan 8.0
Trend Micro Client-server-messaging Security 3.5
Trend Micro Officescan 7.3
Trend Micro Officescan 7.0
Trend Micro Client-server-messaging Security 2.0
Trend Micro Client-server-messaging Security 3.6
Trend Micro Client-server-messaging Security 3.0
9.8
CVSSv3
CVE-2008-2433
The web management console in Trend Micro OfficeScan 7.0 up to and including 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote malicious users to hijac...
Trendmicro Client Server Messaging Suite 3.5
Trendmicro Client Server Messaging Suite 3.6
Trendmicro Officescan
Trendmicro Worry-free Business Security 5.0
NA
CVE-2008-3364
Buffer overflow in the ObjRemoveCtrl Class ActiveX control in OfficeScanRemoveCtrl.dll 7.3.0.1020 in Trend Micro OfficeScan Corp Edition (OSCE) Web-Deployment 7.0, 7.3 build 1343 Patch 4 and other builds, and 8.0; Client Server Messaging Security (CSM) 3.5 and 3.6; and Worry-Free...
Trend Micro Officescan 7.3
1 EDB exploit
NA
CVE-2007-0325
Multiple buffer overflows in the Trend Micro OfficeScan Web-Deployment SetupINICtrl ActiveX control in OfficeScanSetupINI.dll, as used in OfficeScan 7.0 before Build 1344, OfficeScan 7.3 before Build 1241, and Client / Server / Messaging Security 3.0 before Build 1197, allow remo...
Trend Micro Officescan Corporate Edition 7.3
Trend Micro Client-server-messaging Security 3.0
Trend Micro Officescan Corporate Edition 7.0
1 EDB exploit
NA
CVE-2006-5211
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 prior to 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 prior to 6.5.0.1418, 7.0 prior to 7.0.0.1257, and 7.3 prior to 7.3.0.1053 allow remote malicious users to remove OfficeScan clients via a...
Trend Micro Officescan Corporate Edition 6.5
Trend Micro Officescan Corporate Edition 7.0
Trend Micro Officescan Corporate Edition 7.3
NA
CVE-2006-5212
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 prior to 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 prior to 6.5.0.1418, 7.0 prior to 7.0.0.1257, and 7.3 prior to 7.3.0.1053 allow remote malicious users to delete files via a modified fil...
Trend Micro Officescan 6.0
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 7.0
Trend Micro Officescan Corporate 7.3
NA
CVE-2005-3379
Multiple interpretation error in Trend Micro (1) PC-Cillin 2005 12.0.1244 with the 7.510.1002 engine and (2) OfficeScan 7.0 with the 7.510.1002 engine allows remote malicious users to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte se...
Trend Micro Officescan 7.0 Engine 7.510.1002
Trend Micro Pc-cillin 2005 12.0.1244 Engine 7.510.1002
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started