Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2001-1151
Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.53 allows remote malicious users to access sensitive information from the hotdownload directory without authentication, such as the ofcscan.ini configuration file, which contains a weakly encrypted password.
Trend Micro Virus Buster Corporate 3.53
Trend Micro Officescan Corporate 3.53
1.2
CVSSv2
CVE-2001-0132
Interscan VirusWall 3.6.x and previous versions follows symbolic links when uninstalling the product, which allows local users to overwrite arbitrary files via a symlink attack.
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Interscan Viruswall
10
CVSSv2
CVE-2001-0133
The web administration interface for Interscan VirusWall 3.6.x and previous versions does not use encryption, which could allow remote malicious users to obtain the administrator password to sniff the administrator password via the setpasswd.cgi program or other HTTP GET requests...
Trend Micro Interscan Viruswall
Trend Micro Interscan Viruswall 3.0.1
9.3
CVSSv2
CVE-2007-0325
Multiple buffer overflows in the Trend Micro OfficeScan Web-Deployment SetupINICtrl ActiveX control in OfficeScanSetupINI.dll, as used in OfficeScan 7.0 before Build 1344, OfficeScan 7.3 before Build 1241, and Client / Server / Messaging Security 3.0 before Build 1197, allow remo...
Trend Micro Officescan Corporate Edition 7.3
Trend Micro Client-server-messaging Security 3.0
Trend Micro Officescan Corporate Edition 7.0
1 EDB exploit
5
CVSSv2
CVE-2004-1859
Directory traversal vulnerability in Trend Micro Interscan Web Viruswall in InterScan VirusWall 3.5x allows remote malicious users to read arbitrary files via a .. (dot dot) in the URL.
Trend Micro Interscan Viruswall For Windows Nt 3.4
Trend Micro Interscan Viruswall For Windows Nt 3.52
Trend Micro Interscan Viruswall For Windows Nt 3.52 Build1466
Trend Micro Interscan Viruswall For Windows Nt 3.6
Trend Micro Interscan Viruswall For Windows Nt 3.5
Trend Micro Interscan Viruswall For Windows Nt 3.51
1 EDB exploit
7.5
CVSSv2
CVE-1999-1533
Eicon Technology Diva LAN ISDN modem allows a remote malicious user to cause a denial of service (hang) via a long password argument to the login.htm file in its HTTP service.
Trend Micro Interscan Viruswall 3.2.3
Trend Micro Interscan Viruswall 3.3
1 EDB exploit
7.5
CVSSv2
CVE-2002-0440
Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients.
Trend Micro Interscan Viruswall 3.51
Trend Micro Interscan Viruswall 3.6
1 EDB exploit
5
CVSSv2
CVE-2004-1003
Trend ScanMail allows remote malicious users to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file.
Trend Micro Scanmail Domino 2.51
Trend Micro Scanmail Domino 2.6
1 EDB exploit
5
CVSSv2
CVE-2002-2394
InterScan VirusWall 3.6 for Linux and 3.52 for Windows allows remote malicious users to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 chunked transfer encoding.
Trend Micro Interscan Viruswall 3.6
Trend Micro Interscan Viruswall 3.52
4.6
CVSSv2
CVE-2001-0678
A buffer overflow in reggo.dll file used by Trend Micro InterScan VirusWall before 3.51 build 1349 for Windows NT 3.5 and InterScan WebManager 1.2 allows a local malicious user to execute arbitrary code.
Trend Micro Interscan Viruswall 3.51
Trend Micro Interscan Webmanager 1.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »