Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-5212
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 prior to 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 prior to 6.5.0.1418, 7.0 prior to 7.0.0.1257, and 7.3 prior to 7.3.0.1053 allow remote malicious users to delete files via a modified fil...
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 7.0
Trend Micro Officescan 6.0
Trend Micro Officescan Corporate 7.3
NA
CVE-2007-1070
Multiple stack-based buffer overflows in Trend Micro ServerProtect for Windows and EMC 5.58, and for Network Appliance Filer 5.61 and 5.62, allow remote malicious users to execute arbitrary code via crafted RPC requests to TmRpcSrv.dll that trigger overflows when calling the (1) ...
Trend Micro Serverprotect 5.58
Trend Micro Serverprotect 5.61
Trend Micro Serverprotect 5.62
2 EDB exploits
NA
CVE-2008-2434
The Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote malicious users to download an arbitrary library file onto a client system via a "custom update server" argument. NOTE: this can be leveraged for code execution b...
Trend Micro Housecall 6.6
Trend Micro Housecall 6.6.0.1278
Trend Micro Housecall 6.51.0.1028
NA
CVE-2002-1349
Buffer overflow in pop3trap.exe for PC-cillin 2000, 2002, and 2003 allows local users to execute arbitrary code via a long input string to TCP port 110 (POP3).
Trend Micro Officescan Corporate 5.02
Trend Micro Pc-cillin 2000
Trend Micro Pc-cillin 2002
Trend Micro Pc-cillin 2003
1 EDB exploit
NA
CVE-2000-0428
Buffer overflow in the SMTP gateway for InterScan Virus Wall 3.32 and previous versions allows a remote malicious user to execute arbitrary commands via a long filename for a uuencoded attachment.
Trend Micro Interscan Viruswall 3.2.3
Trend Micro Interscan Viruswall 3.3
Trend Micro Interscan Viruswall 3.32
Trend Micro Interscan Viruswall 3.0.1
NA
CVE-2001-1150
Vulnerability in cgiWebupdate.exe in Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.5.2 up to and including 3.5.4 allows remote malicious users to read arbitrary files.
Trend Micro Virus Buster Corporate 3.52
Trend Micro Virus Buster Corporate 3.53
Trend Micro Virus Buster Corporate 3.54
Trend Micro Officescan Corporate 3.5
Trend Micro Officescan Corporate 3.54
NA
CVE-2003-0646
Multiple buffer overflows in ActiveX controls used by Trend Micro HouseCall 5.5 and 5.7, and Damage Cleanup Server 1.0, allow remote malicious users to execute arbitrary code via long parameter strings.
Trend Micro Housecall 5.5
Trend Micro Housecall 5.7
Trend Micro Damage Cleanup Server 1.0
NA
CVE-2008-5545
Trend Micro VSAPI 8.700.0.1004 in Trend Micro AntiVirus, when Internet Explorer 6 or 7 is used, allows remote malicious users to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have...
Trend Micro Trend Micro Antivirus 8.700.0.1004
NA
CVE-2007-1591
VsapiNT.sys in the Scan Engine 8.0 for Trend Micro AntiVirus 14.10.1041, and other products, allows remote malicious users to cause a denial of service (kernel fault and system crash) via a crafted UPX file with a certain field that triggers a divide-by-zero error.
Trend Micro Trend Micro Antivirus 14.10.1041
NA
CVE-2008-3866
The Trend Micro Personal Firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, relies on client-side password protection implemented in the configu...
Trend Micro Internet Security 2008 17.0.1224
Trend Micro Internet Security 2007
Trend Micro Officescan 8.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »