Filtered by vendor Trend Micro
Subscribe
Total
109 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2006-5211 | 1 Trend Micro | 1 Officescan Corporate Edition | 2011-03-07 | 6.4 MEDIUM | N/A |
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 before 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 before 6.5.0.1418, 7.0 before 7.0.0.1257, and 7.3 before 7.3.0.1053 allow remote attackers to remove OfficeScan clients via a certain HTTP request that invokes the OfficeScan CGI program. | |||||
CVE-2006-5212 | 1 Trend Micro | 1 Officescan | 2011-03-07 | 5.0 MEDIUM | N/A |
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 before 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 before 6.5.0.1418, 7.0 before 7.0.0.1257, and 7.3 before 7.3.0.1053 allow remote attackers to delete files via a modified filename parameter in a certain HTTP request that invokes the OfficeScan CGI program. | |||||
CVE-2006-1379 | 1 Trend Micro | 1 Pc-cillin 2006 | 2011-03-07 | 7.2 HIGH | N/A |
Trend Micro PC-cillin Internet Security 2006 14.00.1485 and 14.10.0.1023, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying executable programs such as (1) tmntsrv.exe and (2) tmproxy.exe. | |||||
CVE-2005-3360 | 1 Trend Micro | 1 Pc-cillin 2005 | 2011-03-07 | 7.2 HIGH | N/A |
The installation of Trend Micro PC-Cillin Internet Security 2005 12.00 build 1244, and probably previous versions, uses insecure default ACLs, which allows local users to cause a denial of service (disabled service) and gain system privileges by modifying or moving critical program files. | |||||
CVE-2005-1930 | 1 Trend Micro | 1 Serverprotect | 2011-03-07 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in the Crystal Report component (rptserver.asp) in Trend Micro ServerProtect Management Console 5.58, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, and possibly earlier versions, allows remote attackers to read arbitrary files via the IMAGE parameter. | |||||
CVE-2005-1929 | 1 Trend Micro | 1 Serverprotect | 2011-03-06 | 7.5 HIGH | N/A |
Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and earlier, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote attackers to execute arbitrary code via "wrapped" length values in Chunked transfer requests. NOTE: the original report suggests that the relay.dll issue is related to a problem in which a Microsoft Foundation Classes (MFC) static library returns invalid values under heavy load. As such, this might not be a vulnerability in Trend Micro's product. | |||||
CVE-2003-0646 | 1 Trend Micro | 2 Damage Cleanup Server, Housecall | 2008-09-10 | 7.5 HIGH | N/A |
Multiple buffer overflows in ActiveX controls used by Trend Micro HouseCall 5.5 and 5.7, and Damage Cleanup Server 1.0, allow remote attackers to execute arbitrary code via long parameter strings. | |||||
CVE-2002-0440 | 1 Trend Micro | 1 Interscan Viruswall | 2008-09-10 | 7.5 HIGH | N/A |
Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients. | |||||
CVE-2000-0428 | 1 Trend Micro | 1 Interscan Viruswall | 2008-09-10 | 10.0 HIGH | N/A |
Buffer overflow in the SMTP gateway for InterScan Virus Wall 3.32 and earlier allows a remote attacker to execute arbitrary commands via a long filename for a uuencoded attachment. | |||||
CVE-2000-0205 | 1 Trend Micro | 1 Officescan | 2008-09-10 | 6.4 MEDIUM | N/A |
Trend Micro OfficeScan allows remote attackers to replay administrative commands and modify the configuration of OfficeScan clients. | |||||
CVE-2000-0203 | 1 Trend Micro | 1 Officescan | 2008-09-10 | 5.0 MEDIUM | N/A |
The Trend Micro OfficeScan client tmlisten.exe allows remote attackers to cause a denial of service via malformed data to port 12345. | |||||
CVE-2000-0204 | 1 Trend Micro | 1 Officescan | 2008-09-10 | 5.0 MEDIUM | N/A |
The Trend Micro OfficeScan client allows remote attackers to cause a denial of service by making 5 connections to port 12345, which raises CPU utilization to 100%. | |||||
CVE-2000-0033 | 1 Trend Micro | 1 Interscan Viruswall | 2008-09-10 | 5.0 MEDIUM | N/A |
InterScan VirusWall SMTP scanner does not properly scan messages with malformed attachments. | |||||
CVE-1999-0378 | 1 Trend Micro | 1 Interscan Viruswall | 2008-09-09 | 5.0 MEDIUM | N/A |
InterScan VirusWall for Solaris doesn't scan files for viruses when a single HTTP request includes two GET commands. | |||||
CVE-2007-1169 | 1 Trend Micro | 1 Serverprotect | 2008-09-05 | 5.0 MEDIUM | N/A |
The web interface in Trend Micro ServerProtect for Linux (SPLX) 1.25, 1.3, and 2.5 before 20070216 accepts logon requests through unencrypted HTTP, which might allow remote attackers to obtain credentials by sniffing the network. | |||||
CVE-2005-0533 | 1 Trend Micro | 15 Client-server-messaging Suite Smb, Client-server Suite Smb, Control Manager and 12 more | 2008-09-05 | 7.5 HIGH | N/A |
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure. | |||||
CVE-2002-2395 | 1 Trend Micro | 1 Interscan Viruswall | 2008-09-05 | 5.0 MEDIUM | N/A |
InterScan VirusWall 3.52 for Windows allows remote attackers to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 gzip content encoding. | |||||
CVE-2002-2394 | 1 Trend Micro | 1 Interscan Viruswall | 2008-09-05 | 5.0 MEDIUM | N/A |
InterScan VirusWall 3.6 for Linux and 3.52 for Windows allows remote attackers to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 chunked transfer encoding. | |||||
CVE-2002-1839 | 1 Trend Micro | 1 Interscan Viruswall For Windows Nt | 2008-09-05 | 5.0 MEDIUM | N/A |
Trend Micro InterScan VirusWall for Windows NT 3.52 does not record the sender's IP address in the headers for a mail message when it is passed from VirusWall to the MTA, which allows remote attackers to hide the origin of the message. | |||||
CVE-2002-0637 | 1 Trend Micro | 1 Interscan Viruswall | 2008-09-05 | 7.5 HIGH | N/A |
InterScan VirusWall 3.52 build 1462 allows remote attackers to bypass virus protection via e-mail messages with headers that violate RFC specifications by having (or missing) space characters in unexpected places (aka "space gap"), such as (1) Content-Type :", (2) "Content-Transfer-Encoding :", (3) no space before a boundary declaration, or (4) "boundary= ", which is processed by Outlook Express. |