Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro scanmail vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-3326
Trend Micro ScanMail for Microsoft Exchange (SMEX) 10.2 before Hot Fix Build 3318 and 11.0 before Hot Fix Build 4180 creates session IDs for the web console using a random number generator with predictable values, which makes it easier for remote malicious users to bypass authent...
Trend Micro Scanmail 10.2
Trend Micro Scanmail 11.0
NA
CVE-2004-1003
Trend ScanMail allows remote malicious users to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file.
Trend Micro Scanmail Domino 2.51
Trend Micro Scanmail Domino 2.6
1 EDB exploit
NA
CVE-2003-1343
Trend Micro ScanMail for Exchange (SMEX) prior to 3.81 and prior to 6.1 might install a back door account in smg_Smxcfg30.exe, which allows remote malicious users to gain access to the web management interface via the vcc parameter, possibly "3560121183d3".
Trend Micro Scanmail
1 EDB exploit
NA
CVE-2005-0533
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI prior to 7.510, as used in multiple Trend Micro products, allows remote malicious users to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Trend Micro Interscan Emanager 3.5.2
Trend Micro Scanmail 3.81
Trend Micro Serverprotect 2.5
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.0
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Interscan Viruswall 3.52
Trend Micro Interscan Viruswall 3.5
Trend Micro Interscan Viruswall 3.4
Trend Micro Serverprotect 1.3
Trend Micro Interscan Viruswall Gold
Trend Micro Scanmail Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Interscan Viruswall 3.52 Build1466
Trend Micro Interscan Emanager 3.6
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 5.02
Trend Micro Scanmail 2.51
Trend Micro Scanmail 6.1
Trend Micro Interscan Webmanager 1.2
NA
CVE-2001-0586
TrendMicro ScanMail for Exchange 3.5 Evaluation allows a local malicious user to recover the administrative credentials for ScanMail via a combination of unprotected registry keys and weakly encrypted passwords.
Trend Micro Scanmail Exchange 3.5
NA
CVE-2007-0851
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote malicious users to execute arbitrary code via a malformed UPX compressed executable.
Trend Micro Interscan Emanager 3.5.2
Trend Micro Scanmail 3.81
Trend Micro Pc Cillin - Internet Security 2006
Trend Micro Interscan Viruswall 3.7.0
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 3.11
Trend Micro Interscan Viruswall For Windows Nt 3.6
Trend Micro Officescan Corporate 3.0
Trend Micro Interscan Viruswall 3.2.3
Trend Micro Interscan Viruswall 3.81
Trend Micro Portalprotect 1.2
Trend Micro Interscan Viruswall Gold
Trend Micro Officescan Corporate 7.0
Trend Micro Scanmail Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Serverprotect 5.5.8
Trend Micro Control Manager 2.5.0
Trend Micro Interscan Viruswall 3.7.0 Build1190
Trend Micro Interscan Emanager 3.6
Trend Micro Officescan Corporate 3.13
Trend Micro Interscan Viruswall 3.8.0 Build1130
9.1
CVSSv3
CVE-2017-14090
A vulnerability in Trend Micro ScanMail for Exchange 12.0 exists in which some communications to the update servers are not encrypted.
Trendmicro Scanmail 12.0
6.1
CVSSv3
CVE-2017-14093
The Log Query and Quarantine Query pages in Trend Micro ScanMail for Exchange 12.0 are vulnerable to cross site scripting (XSS) attacks.
Trendmicro Scanmail 12.0
8.8
CVSSv3
CVE-2017-14092
The absence of Anti-CSRF tokens in Trend Micro ScanMail for Exchange 12.0 web interface forms could allow an malicious user to submit authenticated requests when an authenticated user browses an attacker-controlled domain.
Trendmicro Scanmail 12.0
7.5
CVSSv3
CVE-2017-14091
A vulnerability in Trend Micro ScanMail for Exchange 12.0 exists in which certain specific installations that utilize a uncommon feature - Other Update Sources - could be exploited to overwrite sensitive files in the ScanMail for Exchange directory.
Trendmicro Scanmail 12.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-0044
client side
CVE-2021-47601
deserialization
CVE-2024-34994
encryption
CVE-2021-47609
CVE-2024-37079
CVE-2024-38608
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »