Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0791
Trend Micro InterScan VirusWall for Windows NT allows remote malicious users to make configuration changes by directly calling certain CGI programs, which do not restrict access.
Trend Micro Interscan Viruswall
1 EDB exploit
NA
CVE-2006-5157
Format string vulnerability in the ActiveX control (ATXCONSOLE.OCX) in TrendMicro OfficeScan Corporate Edition (OSCE) prior to 7.3 Patch 1 allows remote malicious users to execute arbitrary code via format string identifiers in the "Management Console's Remote Client In...
Trend Micro Officescan Corporate 7.3
NA
CVE-2007-2533
Multiple buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2- Build 1174 allow remote malicious users to execute arbitrary code via a crafted RPC message processed by the (1) the RPCFN_ActiveRollback function in (a) stcommon.dll, or the (2) ENG_SetRealTimeS...
Trend Micro Serverprotect 5.58
NA
CVE-2005-1928
Trend Micro ServerProtect EarthAgent for Windows Management Console 5.58 and possibly earlier versions, when running with Trend Micro Control Manager 2.5 and 3.0, and Damage Cleanup Server 1.1, allows remote malicious users to cause a denial of service (CPU consumption) via a flo...
Trend Micro Serverprotect Earthagent 5.58
NA
CVE-2002-0637
InterScan VirusWall 3.52 build 1462 allows remote malicious users to bypass virus protection via e-mail messages with headers that violate RFC specifications by having (or missing) space characters in unexpected places (aka "space gap"), such as (1) Content-Type :"...
Trend Micro Interscan Viruswall 3.52
1 EDB exploit
NA
CVE-2003-1344
Trend Micro Virus Control System (TVCS) Log Collector allows remote malicious users to obtain usernames, encrypted passwords, and other sensitive information via a URL request for getservers.exe with the action parameter set to "selects1", which returns log files.
Trend Micro Virus Control System
1 EDB exploit
NA
CVE-2005-0383
Trend Micro Control Manager 3.0 Enterprise Edition allows remote malicious users to gain privileges via a replay attack of the encrypted username and password.
Trend Micro Control Manager 3.0 Enterprise
NA
CVE-2008-1365
Stack-based buffer overflow in Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and previous versions, and 7.3 Patch 3 build 1314 and previous versions, allows remote malicious users to execute arbitrary code or cause a denial of service (crash) via a long encrypte...
Trend Micro Officescan Corporate Edition
2 EDB exploits
NA
CVE-2008-1366
Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and previous versions, and 7.3 Patch 3 build 1314 and previous versions, allows remote malicious users to cause a denial of service (process consumption) via (1) an HTTP request without a Content-Length header or (2)...
Trend Micro Officescan Corporate Edition
NA
CVE-2001-0174
Buffer overflow in Trend Micro Virus Buster 2001 8.00 allows remote malicious users to cause a denial of service, and possibly execute arbitrary commands, via a large "To" address.
Trend Micro Virus Buster 2001
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »