Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro officescan 3.0 vulnerabilities and exploits
(subscribe to this query)
935
VMScore
CVE-2007-0325
Multiple buffer overflows in the Trend Micro OfficeScan Web-Deployment SetupINICtrl ActiveX control in OfficeScanSetupINI.dll, as used in OfficeScan 7.0 before Build 1344, OfficeScan 7.3 before Build 1241, and Client / Server / Messaging Security 3.0 before Build 1197, allow remo...
Trend Micro Officescan Corporate Edition 7.0
Trend Micro Officescan Corporate Edition 7.3
Trend Micro Client-server-messaging Security 3.0
1 EDB exploit
890
VMScore
CVE-2008-2437
Stack-based buffer overflow in cgiRecvFile.exe in Trend Micro OfficeScan 7.3 patch 4 build 1362 and other builds, OfficeScan 8.0 and 8.0 SP1, and Client Server Messaging Security 3.6 allows remote malicious users to execute arbitrary code via an HTTP request containing a long Com...
Trend Micro Client-server-messaging Security 3.5
Trend Micro Officescan 7.3
Trend Micro Officescan 8.0
Trend Micro Client-server-messaging Security 2.0
Trend Micro Client-server-messaging Security 3.6
Trend Micro Officescan 7.0
Trend Micro Client-server-messaging Security 3.0
828
VMScore
CVE-2007-0851
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote malicious users to execute arbitrary code via a malformed UPX compressed executable.
Trend Micro Interscan Emanager 3.5.2
Trend Micro Scanmail 3.81
Trend Micro Pc Cillin - Internet Security 2006
Trend Micro Interscan Viruswall 3.7.0
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 3.11
Trend Micro Interscan Viruswall For Windows Nt 3.6
Trend Micro Officescan Corporate 3.0
Trend Micro Interscan Viruswall 3.2.3
Trend Micro Interscan Viruswall 3.81
Trend Micro Portalprotect 1.2
Trend Micro Interscan Viruswall Gold
Trend Micro Officescan Corporate 7.0
Trend Micro Scanmail Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Serverprotect 5.5.8
Trend Micro Control Manager 2.5.0
Trend Micro Interscan Viruswall 3.7.0 Build1190
Trend Micro Interscan Emanager 3.6
Trend Micro Officescan Corporate 3.13
Trend Micro Interscan Viruswall 3.8.0 Build1130
755
VMScore
CVE-2003-1341
The default installation of Trend Micro OfficeScan 3.0 up to and including 3.54 and 5.x allows remote malicious users to bypass authentication from cgiChkMasterPasswd.exe and gain access to the web management console via a direct request to cgiMasterPwd.exe.
Trend Micro Officescan 3.11
Trend Micro Officescan 3.5
Trend Micro Officescan 3.0
Trend Micro Virus Buster 3.52
Trend Micro Virus Buster 3.53
Trend Micro Officescan 3.1.1
Trend Micro Officescan 3.13
Trend Micro Officescan 3.54
Trend Micro Virus Buster 3.54
1 EDB exploit
668
VMScore
CVE-2005-0533
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI prior to 7.510, as used in multiple Trend Micro products, allows remote malicious users to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Trend Micro Interscan Emanager 3.5.2
Trend Micro Scanmail 3.81
Trend Micro Serverprotect 2.5
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.0
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Interscan Viruswall 3.52
Trend Micro Interscan Viruswall 3.5
Trend Micro Interscan Viruswall 3.4
Trend Micro Serverprotect 1.3
Trend Micro Interscan Viruswall Gold
Trend Micro Scanmail Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Interscan Viruswall 3.52 Build1466
Trend Micro Interscan Emanager 3.6
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 5.02
Trend Micro Scanmail 2.51
Trend Micro Scanmail 6.1
Trend Micro Interscan Webmanager 1.2
641
VMScore
CVE-2020-8607
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a syst...
Trendmicro Antivirus Toolkit
Trendmicro Apex One 2019
Trendmicro Apex One Saas
Trendmicro Deep Security 9.6
Trendmicro Deep Security 10.0
Trendmicro Deep Security 11.0
Trendmicro Deep Security 12.0
Trendmicro Officescan Xg
Trendmicro Officescan Business Security 9.0
Trendmicro Officescan Business Security 9.5
Trendmicro Officescan Business Security 10.0
Trendmicro Officescan Business Security Service -
Trendmicro Officescan Cloud 15
Trendmicro Officescan Cloud 16.0
Trendmicro Online Scan 8.0
Trendmicro Portable Security 2.0
Trendmicro Portable Security 3.0
Trendmicro Rootkit Buster 2.2
Trendmicro Safe Lock -
Trendmicro Safe Lock 2.0
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect 6.0
641
VMScore
CVE-2004-2430
Trend OfficeScan Corporate Edition 5.58 and possibly earler does not drop privileges when opening a help window from a virus detection pop-up window, which allows local users to gain SYSTEM privileges.
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 5.02
Trend Micro Officescan Corporate 5.5
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan 3.0
Trend Micro Officescan Corporate 5.58
Trend Micro Officescan Corporate 3.5
Trend Micro Officescan Corporate 3.54
505
VMScore
CVE-2000-0204
The Trend Micro OfficeScan client allows remote malicious users to cause a denial of service by making 5 connections to port 12345, which raises CPU utilization to 100%.
Trend Micro Officescan 3.5
1 EDB exploit
409
VMScore
CVE-2004-2006
Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection.
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 5.02
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan 3.0
Trend Micro Officescan Corporate 5.58
Trend Micro Officescan Corporate 3.5
Trend Micro Officescan Corporate 3.54
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started