Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-1999-1529
A buffer overflow exists in the HELO command in Trend Micro Interscan VirusWall SMTP gateway 3.23/3.3 for NT, which may allow an malicious user to execute arbitrary code.
Trend Micro Interscan Viruswall 3.3
Trend Micro Interscan Viruswall 3.23
2 EDB exploits
7.5
CVSSv2
CVE-1999-1533
Eicon Technology Diva LAN ISDN modem allows a remote malicious user to cause a denial of service (hang) via a long password argument to the login.htm file in its HTTP service.
Trend Micro Interscan Viruswall 3.2.3
Trend Micro Interscan Viruswall 3.3
1 EDB exploit
10
CVSSv2
CVE-2001-0679
A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote malicious user to execute arbitrary code by sending a long HELO command to the server.
Trend Micro Interscan Viruswall 3.23
Trend Micro Interscan Viruswall 3.3
2 EDB exploits
7.2
CVSSv2
CVE-2006-1379
Trend Micro PC-cillin Internet Security 2006 14.00.1485 and 14.10.0.1023, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying executable programs such as (1) tmntsrv.exe and (2) tmproxy.exe.
Trend Micro Pc-cillin 2006 14.00.1485
Trend Micro Pc-cillin 2006
6.6
CVSSv2
CVE-2007-4277
The Trend Micro AntiVirus scan engine prior to 8.550-1001, as used in Trend Micro PC-Cillin Internet Security 2007, and Tmxpflt.sys 8.320.1004 and 8.500.0.1002, has weak permissions (Everyone:Write) for the \\.\Tmfilter device, which allows local users to send arbitrary content t...
Trend Micro Scan Engine
Trend Micro Pc-cillin Internet Security 2007
7.5
CVSSv2
CVE-2005-1929
Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and previous versions, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote malicious users to execute arbitrary code...
Trend Micro Serverprotect
10
CVSSv2
CVE-2007-2508
Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote malicious users to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the A...
Trend Micro Serverprotect
3 EDB exploits
10
CVSSv2
CVE-2007-4731
Stack-based buffer overflow in the TMregChange function in TMReg.dll in Trend Micro ServerProtect prior to 5.58 Security Patch 4 allows remote malicious users to execute arbitrary code via a crafted packet to TCP port 5005.
Trend Micro Serverprotect
7.5
CVSSv2
CVE-2003-1343
Trend Micro ScanMail for Exchange (SMEX) prior to 3.81 and prior to 6.1 might install a back door account in smg_Smxcfg30.exe, which allows remote malicious users to gain access to the web management interface via the vcc parameter, possibly "3560121183d3".
Trend Micro Scanmail
1 EDB exploit
5
CVSSv2
CVE-2000-0203
The Trend Micro OfficeScan client tmlisten.exe allows remote malicious users to cause a denial of service via malformed data to port 12345.
Trend Micro Officescan 3.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2021-35000
CVE-2024-4439
unauthorized
CVE-2024-0042
CVE-2024-31848
CVE-2023-40694
cache poisoning
CVE-2024-23707
firmware
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »