Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0679
A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote malicious user to execute arbitrary code by sending a long HELO command to the server.
Trend Micro Interscan Viruswall 3.23
Trend Micro Interscan Viruswall 3.3
2 EDB exploits
NA
CVE-1999-1529
A buffer overflow exists in the HELO command in Trend Micro Interscan VirusWall SMTP gateway 3.23/3.3 for NT, which may allow an malicious user to execute arbitrary code.
Trend Micro Interscan Viruswall 3.3
Trend Micro Interscan Viruswall 3.23
2 EDB exploits
NA
CVE-2005-3379
Multiple interpretation error in Trend Micro (1) PC-Cillin 2005 12.0.1244 with the 7.510.1002 engine and (2) OfficeScan 7.0 with the 7.510.1002 engine allows remote malicious users to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte se...
Trend Micro Officescan 7.0 Engine 7.510.1002
Trend Micro Pc-cillin 2005 12.0.1244 Engine 7.510.1002
NA
CVE-2007-4277
The Trend Micro AntiVirus scan engine prior to 8.550-1001, as used in Trend Micro PC-Cillin Internet Security 2007, and Tmxpflt.sys 8.320.1004 and 8.500.0.1002, has weak permissions (Everyone:Write) for the \\.\Tmfilter device, which allows local users to send arbitrary content t...
Trend Micro Scan Engine
Trend Micro Pc-cillin Internet Security 2007
NA
CVE-2006-1379
Trend Micro PC-cillin Internet Security 2006 14.00.1485 and 14.10.0.1023, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying executable programs such as (1) tmntsrv.exe and (2) tmproxy.exe.
Trend Micro Pc-cillin 2006 14.00.1485
Trend Micro Pc-cillin 2006
NA
CVE-2007-2508
Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote malicious users to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the A...
Trend Micro Serverprotect
3 EDB exploits
NA
CVE-2007-4731
Stack-based buffer overflow in the TMregChange function in TMReg.dll in Trend Micro ServerProtect prior to 5.58 Security Patch 4 allows remote malicious users to execute arbitrary code via a crafted packet to TCP port 5005.
Trend Micro Serverprotect
NA
CVE-2005-1929
Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and previous versions, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote malicious users to execute arbitrary code...
Trend Micro Serverprotect
NA
CVE-2003-1343
Trend Micro ScanMail for Exchange (SMEX) prior to 3.81 and prior to 6.1 might install a back door account in smg_Smxcfg30.exe, which allows remote malicious users to gain access to the web management interface via the vcc parameter, possibly "3560121183d3".
Trend Micro Scanmail
1 EDB exploit
NA
CVE-2001-0791
Trend Micro InterScan VirusWall for Windows NT allows remote malicious users to make configuration changes by directly calling certain CGI programs, which do not restrict access.
Trend Micro Interscan Viruswall
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »