Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2000-0204
The Trend Micro OfficeScan client allows remote malicious users to cause a denial of service by making 5 connections to port 12345, which raises CPU utilization to 100%.
Trend Micro Officescan 3.5
1 EDB exploit
10
CVSSv2
CVE-2007-4219
Integer overflow in the RPCFN_SYNC_TASK function in StRpcSrv.dll, as used by the ServerProtect service (SpntSvc.exe), in Trend Micro ServerProtect for Windows prior to 5.58 Security Patch 4 allows remote malicious users to execute arbitrary code via a certain integer field in a r...
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2007-4490
Multiple buffer overflows in EarthAgent.exe in Trend Micro ServerProtect 5.58 for Windows before Security Patch 4 allow remote malicious users to have an unknown impact via certain RPC function calls to (1) RPCFN_EVENTBACK_DoHotFix or (2) CMD_CHANGE_AGENT_REGISTER_INFO.
Trend Micro Serverprotect 5.58
5
CVSSv2
CVE-1999-0378
InterScan VirusWall for Solaris doesn't scan files for viruses when a single HTTP request includes two GET commands.
Trend Micro Interscan Viruswall
5.8
CVSSv2
CVE-2016-3664
Trend Micro Mobile Security for iOS prior to 3.2.1188 does not verify the X.509 certificate of the mobile application login server, which allows man-in-the-middle malicious users to spoof this server and obtain sensitive information via a crafted certificate.
Trend Micro Mobile Security
10
CVSSv2
CVE-2007-6507
SpntSvc.exe daemon in Trend Micro ServerProtect 5.58 for Windows, before Security Patch 4, exposes unspecified dangerous sub-functions from StRpcSrv.dll in the DCE/RPC interface, which allows remote malicious users to obtain "full file system access" and execute arbitra...
Trend Micro Serverprotect 5.58 Security Patch 3
7.5
CVSSv2
CVE-2006-6178
Buffer overflow in PCCSRV\Web_console\RemoteInstallCGI\Wizard.exe for Trend Micro OfficeScan 7.3 before build 7.3.0.1087 allows remote malicious users to execute arbitrary code via unknown attack vectors.
Trend Micro Officescan 7.3
7.5
CVSSv2
CVE-2006-6179
Buffer overflow in PCCSRV\Web_console\RemoteInstallCGI\CgiRemoteInstall.exe for Trend Micro OfficeScan 7.3 before build 7.3.0.1089 allows remote malicious users to execute arbitrary code via unknown attack vectors.
Trend Micro Officescan 7.3
10
CVSSv2
CVE-2006-1381
Trend Micro OfficeScan 5.5, and probably other versions prior to 6.5, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying tmlisten.exe.
Trend Micro Officescan 5.5
10
CVSSv2
CVE-2011-5001
Stack-based buffer overflow in the CGenericScheduler::AddTask function in cmdHandlerRedAlertController.dll in CmdProcessor.exe in Trend Micro Control Manager 5.5 before Build 1613 allows remote malicious users to execute arbitrary code via a crafted IPC packet to TCP port 20101.
Trend Micro Control Manager
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »