Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1003
Trend ScanMail allows remote malicious users to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file.
Trend Micro Scanmail Domino 2.51
Trend Micro Scanmail Domino 2.6
1 EDB exploit
NA
CVE-2001-0679
A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote malicious user to execute arbitrary code by sending a long HELO command to the server.
Trend Micro Interscan Viruswall 3.23
Trend Micro Interscan Viruswall 3.3
2 EDB exploits
NA
CVE-2007-4277
The Trend Micro AntiVirus scan engine prior to 8.550-1001, as used in Trend Micro PC-Cillin Internet Security 2007, and Tmxpflt.sys 8.320.1004 and 8.500.0.1002, has weak permissions (Everyone:Write) for the \\.\Tmfilter device, which allows local users to send arbitrary content t...
Trend Micro Pc-cillin Internet Security 2007
Trend Micro Scan Engine
NA
CVE-2006-1379
Trend Micro PC-cillin Internet Security 2006 14.00.1485 and 14.10.0.1023, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying executable programs such as (1) tmntsrv.exe and (2) tmproxy.exe.
Trend Micro Pc-cillin 2006 14.00.1485
Trend Micro Pc-cillin 2006
NA
CVE-2001-1151
Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.53 allows remote malicious users to access sensitive information from the hotdownload directory without authentication, such as the ofcscan.ini configuration file, which contains a weakly encrypted password.
Trend Micro Virus Buster Corporate 3.53
Trend Micro Officescan Corporate 3.53
NA
CVE-2005-3379
Multiple interpretation error in Trend Micro (1) PC-Cillin 2005 12.0.1244 with the 7.510.1002 engine and (2) OfficeScan 7.0 with the 7.510.1002 engine allows remote malicious users to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte se...
Trend Micro Pc-cillin 2005 12.0.1244 Engine 7.510.1002
Trend Micro Officescan 7.0 Engine 7.510.1002
NA
CVE-2007-4731
Stack-based buffer overflow in the TMregChange function in TMReg.dll in Trend Micro ServerProtect prior to 5.58 Security Patch 4 allows remote malicious users to execute arbitrary code via a crafted packet to TCP port 5005.
Trend Micro Serverprotect
NA
CVE-2007-2508
Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote malicious users to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the A...
Trend Micro Serverprotect
3 EDB exploits
NA
CVE-2003-1343
Trend Micro ScanMail for Exchange (SMEX) prior to 3.81 and prior to 6.1 might install a back door account in smg_Smxcfg30.exe, which allows remote malicious users to gain access to the web management interface via the vcc parameter, possibly "3560121183d3".
Trend Micro Scanmail
1 EDB exploit
NA
CVE-2005-1929
Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and previous versions, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote malicious users to execute arbitrary code...
Trend Micro Serverprotect
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »