Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro vulnerabilities and exploits
(subscribe to this query)
5.1
CVSSv2
CVE-2006-5157
Format string vulnerability in the ActiveX control (ATXCONSOLE.OCX) in TrendMicro OfficeScan Corporate Edition (OSCE) prior to 7.3 Patch 1 allows remote malicious users to execute arbitrary code via format string identifiers in the "Management Console's Remote Client In...
Trend Micro Officescan Corporate 7.3
10
CVSSv2
CVE-2007-6507
SpntSvc.exe daemon in Trend Micro ServerProtect 5.58 for Windows, before Security Patch 4, exposes unspecified dangerous sub-functions from StRpcSrv.dll in the DCE/RPC interface, which allows remote malicious users to obtain "full file system access" and execute arbitra...
Trend Micro Serverprotect 5.58 Security Patch 3
5.8
CVSSv2
CVE-2016-3664
Trend Micro Mobile Security for iOS prior to 3.2.1188 does not verify the X.509 certificate of the mobile application login server, which allows man-in-the-middle malicious users to spoof this server and obtain sensitive information via a crafted certificate.
Trend Micro Mobile Security
10
CVSSv2
CVE-2007-2533
Multiple buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2- Build 1174 allow remote malicious users to execute arbitrary code via a crafted RPC message processed by the (1) the RPCFN_ActiveRollback function in (a) stcommon.dll, or the (2) ENG_SetRealTimeS...
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2011-5001
Stack-based buffer overflow in the CGenericScheduler::AddTask function in cmdHandlerRedAlertController.dll in CmdProcessor.exe in Trend Micro Control Manager 5.5 before Build 1613 allows remote malicious users to execute arbitrary code via a crafted IPC packet to TCP port 20101.
Trend Micro Control Manager
1 EDB exploit
10
CVSSv2
CVE-2007-3455
cgiChkMasterPwd.exe prior to 8.0.0.142 in Trend Micro OfficeScan Corporate Edition 8.0 allows remote malicious users to bypass the password requirement and gain access to the Management Console via an empty hash and empty encrypted password string, related to "stored decrypt...
Trend Micro Officescan 8.0
5
CVSSv2
CVE-2000-0203
The Trend Micro OfficeScan client tmlisten.exe allows remote malicious users to cause a denial of service via malformed data to port 12345.
Trend Micro Officescan 3.5
6.4
CVSSv2
CVE-2000-0205
Trend Micro OfficeScan allows remote malicious users to replay administrative commands and modify the configuration of OfficeScan clients.
Trend Micro Officescan 3.5
5
CVSSv2
CVE-2000-0204
The Trend Micro OfficeScan client allows remote malicious users to cause a denial of service by making 5 connections to port 12345, which raises CPU utilization to 100%.
Trend Micro Officescan 3.5
1 EDB exploit
6.9
CVSSv2
CVE-2007-0602
Buffer overflow in libvsapi.so in the VSAPI library in Trend Micro VirusWall 3.81 for Linux, as used by IScan.BASE/vscan, allows local users to gain privileges via a long command line argument, a different vulnerability than CVE-2005-0533.
Trend Micro Viruswall 3.81
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »