Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0205
Trend Micro OfficeScan allows remote malicious users to replay administrative commands and modify the configuration of OfficeScan clients.
Trend Micro Officescan 3.5
NA
CVE-2007-0602
Buffer overflow in libvsapi.so in the VSAPI library in Trend Micro VirusWall 3.81 for Linux, as used by IScan.BASE/vscan, allows local users to gain privileges via a long command line argument, a different vulnerability than CVE-2005-0533.
Trend Micro Viruswall 3.81
1 EDB exploit
NA
CVE-2005-1928
Trend Micro ServerProtect EarthAgent for Windows Management Console 5.58 and possibly earlier versions, when running with Trend Micro Control Manager 2.5 and 3.0, and Damage Cleanup Server 1.1, allows remote malicious users to cause a denial of service (CPU consumption) via a flo...
Trend Micro Serverprotect Earthagent 5.58
NA
CVE-2003-1344
Trend Micro Virus Control System (TVCS) Log Collector allows remote malicious users to obtain usernames, encrypted passwords, and other sensitive information via a URL request for getservers.exe with the action parameter set to "selects1", which returns log files.
Trend Micro Virus Control System
1 EDB exploit
NA
CVE-2002-0637
InterScan VirusWall 3.52 build 1462 allows remote malicious users to bypass virus protection via e-mail messages with headers that violate RFC specifications by having (or missing) space characters in unexpected places (aka "space gap"), such as (1) Content-Type :"...
Trend Micro Interscan Viruswall 3.52
1 EDB exploit
NA
CVE-2001-0432
Buffer overflows in various CGI programs in the remote administration service for Trend Micro Interscan VirusWall 3.01 allow remote malicious users to execute arbitrary commands.
Trend Micro Interscan Viruswall 3.0.1
1 EDB exploit
6.8
CVSSv3
CVE-2023-28005
A vulnerability in Trend Micro Endpoint Encryption Full Disk Encryption version 6.0.0.3204 and below could allow an attacker with physical access to an affected device to bypass Microsoft Windows? Secure Boot process in an attempt to execute other attacks to obtain access to the ...
Trendmicro Trend Micro Endpoint Encryption
NA
CVE-2001-1026
Trend Micro InterScan AppletTrap 2.0 does not properly filter URLs when they are modified in certain ways such as (1) using a double slash (//) instead of a single slash, (2) URL-encoded characters, (3) requesting the IP address instead of the domain name, or (4) using a leading ...
Trend Micro Interscan Applettrap 2.0
NA
CVE-2008-1365
Stack-based buffer overflow in Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and previous versions, and 7.3 Patch 3 build 1314 and previous versions, allows remote malicious users to execute arbitrary code or cause a denial of service (crash) via a long encrypte...
Trend Micro Officescan Corporate Edition
2 EDB exploits
NA
CVE-2008-1366
Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and previous versions, and 7.3 Patch 3 build 1314 and previous versions, allows remote malicious users to cause a denial of service (process consumption) via (1) an HTTP request without a Content-Length header or (2)...
Trend Micro Officescan Corporate Edition
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »