Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2007-2528
Buffer overflow in AgRpcCln.dll for Trend Micro ServerProtect 5.58 for Windows before Security Patch 3 Build 1176 allows remote malicious users to execute arbitrary code via unknown vectors related to RPC requests. NOTE: this is probably a different vulnerability than CVE-2007-25...
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2007-2533
Multiple buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2- Build 1174 allow remote malicious users to execute arbitrary code via a crafted RPC message processed by the (1) the RPCFN_ActiveRollback function in (a) stcommon.dll, or the (2) ENG_SetRealTimeS...
Trend Micro Serverprotect 5.58
NA
CVE-2023-28005
A vulnerability in Trend Micro Endpoint Encryption Full Disk Encryption version 6.0.0.3204 and below could allow an attacker with physical access to an affected device to bypass Microsoft Windows? Secure Boot process in an attempt to execute other attacks to obtain access to the ...
Trendmicro Trend Micro Endpoint Encryption
4.6
CVSSv2
CVE-2001-0586
TrendMicro ScanMail for Exchange 3.5 Evaluation allows a local malicious user to recover the administrative credentials for ScanMail via a combination of unprotected registry keys and weakly encrypted passwords.
Trend Micro Scanmail Exchange 3.5
7.5
CVSSv2
CVE-2001-0761
Buffer overflow in HttpSave.dll in Trend Micro InterScan WebManager 1.2 allows remote malicious users to execute arbitrary code via a long value to a certain parameter.
Trend Micro Interscan Webmanager 1.2
5.1
CVSSv2
CVE-2006-5157
Format string vulnerability in the ActiveX control (ATXCONSOLE.OCX) in TrendMicro OfficeScan Corporate Edition (OSCE) prior to 7.3 Patch 1 allows remote malicious users to execute arbitrary code via format string identifiers in the "Management Console's Remote Client In...
Trend Micro Officescan Corporate 7.3
5
CVSSv2
CVE-2003-1344
Trend Micro Virus Control System (TVCS) Log Collector allows remote malicious users to obtain usernames, encrypted passwords, and other sensitive information via a URL request for getservers.exe with the action parameter set to "selects1", which returns log files.
Trend Micro Virus Control System
1 EDB exploit
10
CVSSv2
CVE-2001-0432
Buffer overflows in various CGI programs in the remote administration service for Trend Micro Interscan VirusWall 3.01 allow remote malicious users to execute arbitrary commands.
Trend Micro Interscan Viruswall 3.0.1
1 EDB exploit
5
CVSSv2
CVE-2002-2395
InterScan VirusWall 3.52 for Windows allows remote malicious users to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 gzip content encoding.
Trend Micro Interscan Viruswall 3.52
7.5
CVSSv2
CVE-2002-0637
InterScan VirusWall 3.52 build 1462 allows remote malicious users to bypass virus protection via e-mail messages with headers that violate RFC specifications by having (or missing) space characters in unexpected places (aka "space gap"), such as (1) Content-Type :"...
Trend Micro Interscan Viruswall 3.52
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »