Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2008-2435
Use-after-free vulnerability in the Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote malicious users to execute arbitrary code via a crafted notifyOnLoadNative callback function.
Trend Micro Housecall 6.6.0.1278
Trend Micro Housecall 6.51.0.1028
10
CVSSv2
CVE-2006-5269
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote malicious users to execute arbitrary code via unknown vectors, probably related to an RPC interface.
Trend Micro Serverprotect 5.7
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2008-3862
Stack-based buffer overflow in CGI programs in the server in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds prior to 1374, and 8.0 SP1 Patch 1 before build 3110, allows remote malicious users to execute arbitrary code via an HTTP POST request containing crafted fo...
Trend Micro Officescan 7.3
Trend Micro Officescan 8.0
10
CVSSv2
CVE-2007-0072
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote malicious users to execute arbitrary code via unknown vectors, possibly related to a read operation over RPC.
Trend Micro Serverprotect 5.7
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2007-0073
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote malicious users to execute arbitrary code via unknown vectors, possibly related to a file read operation over RPC.
Trend Micro Serverprotect 5.7
Trend Micro Serverprotect 5.58
5
CVSSv2
CVE-2015-3326
Trend Micro ScanMail for Microsoft Exchange (SMEX) 10.2 before Hot Fix Build 3318 and 11.0 before Hot Fix Build 4180 creates session IDs for the web console using a random number generator with predictable values, which makes it easier for remote malicious users to bypass authent...
Trend Micro Scanmail 11.0
Trend Micro Scanmail 10.2
10
CVSSv2
CVE-2007-0074
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote malicious users to execute arbitrary code via unknown vectors, possibly related to a folder read operation over RPC.
Trend Micro Serverprotect 5.7
Trend Micro Serverprotect 5.58
6.9
CVSSv2
CVE-2007-3873
Stack-based buffer overflow in vstlib32.dll 1.2.0.1012 in the SSAPI Engine 5.0.0.1066 up to and including 5.2.0.1012 in Trend Micro AntiSpyware 3.5 and PC-Cillin Internet Security 2007 15.0 up to and including 15.3, when the Venus Spy Trap (VST) feature is enabled, allows local u...
Trend Micro Antispyware 3.5
Trend Micro Pc-cillin Internet Security 2007 15.0
Trend Micro Pc-cillin Internet Security 2007 15.2
Trend Micro Pc-cillin Internet Security 2007 15.2 Patch
Trend Micro Pc-cillin Internet Security 2007 15.3
6.4
CVSSv2
CVE-2006-5211
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 prior to 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 prior to 6.5.0.1418, 7.0 prior to 7.0.0.1257, and 7.3 prior to 7.3.0.1053 allow remote malicious users to remove OfficeScan clients via a...
Trend Micro Officescan Corporate Edition 6.5
Trend Micro Officescan Corporate Edition 7.0
Trend Micro Officescan Corporate Edition 7.3
9
CVSSv2
CVE-2016-5840
hotfix_upload.cgi in Trend Micro Deep Discovery Inspector (DDI) 3.7, 3.8 SP1 (3.81), and 3.8 SP2 (3.82) allows remote administrators to execute arbitrary code via shell metacharacters in the filename parameter of the Content-Disposition header.
Trend Micro Deep Discovery Inspector 3.7
Trend Micro Deep Discovery Inspector 3.82
Trend Micro Deep Discovery Inspector 3.81
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22460
CVE-2024-4646
CVE-2024-29212
IMAP
CVE-2023-36672
CVE-2024-34547
command injection
CVE-2024-4651
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »