Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro interscan messaging security suite vulnerabilities and exploits
(subscribe to this query)
454
VMScore
CVE-2006-0642
Trend Micro ServerProtect 5.58, and possibly InterScan Messaging Security Suite and InterScan Web Security Suite, have a default configuration setting of "Do not scan compressed files when Extracted file count exceeds 500 files," which may be too low in certain circumst...
Trend Micro Interscan Web Security Suite
Trend Micro Interscan Messaging Security Suite
Trend Micro Serverprotect 5.58
668
VMScore
CVE-2005-0533
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI prior to 7.510, as used in multiple Trend Micro products, allows remote malicious users to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Trend Micro Interscan Emanager 3.5.2
Trend Micro Scanmail 3.81
Trend Micro Serverprotect 2.5
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.0
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Interscan Viruswall 3.52
Trend Micro Interscan Viruswall 3.5
Trend Micro Interscan Viruswall 3.4
Trend Micro Serverprotect 1.3
Trend Micro Interscan Viruswall Gold
Trend Micro Scanmail Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Interscan Viruswall 3.52 Build1466
Trend Micro Interscan Emanager 3.6
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 5.02
Trend Micro Scanmail 2.51
Trend Micro Scanmail 6.1
Trend Micro Interscan Webmanager 1.2
828
VMScore
CVE-2007-0851
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote malicious users to execute arbitrary code via a malformed UPX compressed executable.
Trend Micro Interscan Emanager 3.5.2
Trend Micro Scanmail 3.81
Trend Micro Pc Cillin - Internet Security 2006
Trend Micro Interscan Viruswall 3.7.0
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 3.11
Trend Micro Interscan Viruswall For Windows Nt 3.6
Trend Micro Officescan Corporate 3.0
Trend Micro Interscan Viruswall 3.2.3
Trend Micro Interscan Viruswall 3.81
Trend Micro Portalprotect 1.2
Trend Micro Interscan Viruswall Gold
Trend Micro Officescan Corporate 7.0
Trend Micro Scanmail Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Serverprotect 5.5.8
Trend Micro Control Manager 2.5.0
Trend Micro Interscan Viruswall 3.7.0 Build1190
Trend Micro Interscan Emanager 3.6
Trend Micro Officescan Corporate 3.13
Trend Micro Interscan Viruswall 3.8.0 Build1130
435
VMScore
CVE-2012-2995
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro InterScan Messaging Security Suite 7.1-Build_Win32_1394 allow remote malicious users to inject arbitrary web script or HTML via (1) the wrsApprovedURL parameter to addRuleAttrWrsApproveUrl.imss or (2) the src para...
Trendmicro Interscan Messaging Security Suite 7.1
1 EDB exploit
685
VMScore
CVE-2012-2996
Cross-site request forgery (CSRF) vulnerability in saveAccountSubTab.imss in Trend Micro InterScan Messaging Security Suite 7.1-Build_Win32_1394 allows remote malicious users to hijack the authentication of administrators for requests that create admin accounts via a saveAuth act...
Trendmicro Interscan Messaging Security Suite 7.1
1 EDB exploit
641
VMScore
CVE-2006-1380
ISNTSmtp directory in Trend Micro InterScan Messaging Security Suite (IMSS) 5.5 build 1183 and possibly other versions prior to 5.7.0.1121, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying ISNTSysMonitor.exe.
Trendmicro Interscan Messaging Security Suite 5.5
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started