Filtered by vendor Trend Micro
Subscribe
Total
108 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-3864 | 1 Trend Micro | 3 Internet Security 2007, Internet Security 2008, Officescan | 2018-10-11 | 5.0 MEDIUM | N/A |
The ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allows remote attackers to cause a denial of service (service crash) via a packet with a large value in an unspecified size field. | |||||
CVE-2008-3862 | 1 Trend Micro | 1 Officescan | 2018-10-11 | 10.0 HIGH | N/A |
Stack-based buffer overflow in CGI programs in the server in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds before 1374, and 8.0 SP1 Patch 1 before build 3110, allows remote attackers to execute arbitrary code via an HTTP POST request containing crafted form data, related to "parsing CGI requests." | |||||
CVE-2008-2439 | 1 Trend Micro | 2 Officescan, Worry Free Business Security | 2018-10-11 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in the UpdateAgent function in TmListen.exe in the OfficeScanNT Listener service in the client in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds before 1372, OfficeScan 8.0 SP1 before build 1222, OfficeScan 8.0 SP1 Patch 1 before build 3087, and Worry-Free Business Security 5.0 before build 1220 allows remote attackers to read arbitrary files via directory traversal sequences in an HTTP request. NOTE: some of these details are obtained from third party information. | |||||
CVE-2008-2437 | 1 Trend Micro | 2 Client-server-messaging Security, Officescan | 2018-10-11 | 10.0 HIGH | N/A |
Stack-based buffer overflow in cgiRecvFile.exe in Trend Micro OfficeScan 7.3 patch 4 build 1362 and other builds, OfficeScan 8.0 and 8.0 SP1, and Client Server Messaging Security 3.6 allows remote attackers to execute arbitrary code via an HTTP request containing a long ComputerName parameter. | |||||
CVE-2008-2435 | 1 Trend Micro | 1 Housecall | 2018-10-11 | 9.3 HIGH | N/A |
Use-after-free vulnerability in the Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote attackers to execute arbitrary code via a crafted notifyOnLoadNative callback function. | |||||
CVE-2008-2434 | 1 Trend Micro | 1 Housecall | 2018-10-11 | 9.3 HIGH | N/A |
The Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote attackers to download an arbitrary library file onto a client system via a "custom update server" argument. NOTE: this can be leveraged for code execution by writing to a Startup folder. | |||||
CVE-2011-5001 | 1 Trend Micro | 1 Control Manager | 2018-10-09 | 10.0 HIGH | N/A |
Stack-based buffer overflow in the CGenericScheduler::AddTask function in cmdHandlerRedAlertController.dll in CmdProcessor.exe in Trend Micro Control Manager 5.5 before Build 1613 allows remote attackers to execute arbitrary code via a crafted IPC packet to TCP port 20101. | |||||
CVE-2000-0007 | 1 Trend Micro | 1 Pc-cillin | 2018-05-03 | 5.0 MEDIUM | N/A |
Trend Micro PC-Cillin does not restrict access to its internal proxy port, allowing remote attackers to conduct a denial of service. | |||||
CVE-2001-1151 | 1 Trend Micro | 2 Officescan, Virus Buster | 2017-12-19 | 5.0 MEDIUM | N/A |
Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.53 allows remote attackers to access sensitive information from the hotdownload directory without authentication, such as the ofcscan.ini configuration file, which contains a weakly encrypted password. | |||||
CVE-2001-1026 | 1 Trend Micro | 1 Interscan Applettrap | 2017-12-19 | 7.5 HIGH | N/A |
Trend Micro InterScan AppletTrap 2.0 does not properly filter URLs when they are modified in certain ways such as (1) using a double slash (//) instead of a single slash, (2) URL-encoded characters, (3) requesting the IP address instead of the domain name, or (4) using a leading 0 in an octet of an IP address. | |||||
CVE-2001-0958 | 1 Trend Micro | 2 Interscan Emanager, Interscan Viruswall | 2017-12-19 | 7.5 HIGH | N/A |
Buffer overflows in eManager plugin for Trend Micro InterScan VirusWall for NT 3.51 and 3.51J allow remote attackers to execute arbitrary code via long arguments to the CGI programs (1) register.dll, (2) ContentFilter.dll, (3) SFNofitication.dll, (4) register.dll, (5) TOP10.dll, (6) SpamExcp.dll, and (7) spamrule.dll. | |||||
CVE-2001-0679 | 1 Trend Micro | 1 Interscan Viruswall | 2017-12-19 | 10.0 HIGH | N/A |
A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote attacker to execute arbitrary code by sending a long HELO command to the server. | |||||
CVE-2001-0678 | 1 Trend Micro | 2 Interscan Viruswall, Interscan Webmanager | 2017-12-19 | 4.6 MEDIUM | N/A |
A buffer overflow in reggo.dll file used by Trend Micro InterScan VirusWall prior to 3.51 build 1349 for Windows NT 3.5 and InterScan WebManager 1.2 allows a local attacker to execute arbitrary code. | |||||
CVE-1999-1533 | 1 Trend Micro | 1 Interscan Viruswall | 2017-12-19 | 7.5 HIGH | N/A |
Eicon Technology Diva LAN ISDN modem allows a remote attacker to cause a denial of service (hang) via a long password argument to the login.htm file in its HTTP service. | |||||
CVE-1999-1529 | 1 Trend Micro | 1 Interscan Viruswall | 2017-12-19 | 7.5 HIGH | N/A |
A buffer overflow exists in the HELO command in Trend Micro Interscan VirusWall SMTP gateway 3.23/3.3 for NT, which may allow an attacker to execute arbitrary code. | |||||
CVE-2001-0586 | 1 Trend Micro | 1 Scanmail Exchange | 2017-10-10 | 4.6 MEDIUM | N/A |
TrendMicro ScanMail for Exchange 3.5 Evaluation allows a local attacker to recover the administrative credentials for ScanMail via a combination of unprotected registry keys and weakly encrypted passwords. | |||||
CVE-2001-0174 | 1 Trend Micro | 1 Virus Buster 2001 | 2017-10-10 | 7.6 HIGH | N/A |
Buffer overflow in Trend Micro Virus Buster 2001 8.00 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a large "To" address. | |||||
CVE-2000-1106 | 1 Trend Micro | 1 Interscan Viruswall | 2017-10-10 | 4.6 MEDIUM | N/A |
Trend Micro InterScan VirusWall creates an "Intscan" share to the "InterScan" directory with permissions that grant Full Control permissions to the Everyone group, which allows attackers to gain privileges by modifying the VirusWall programs. | |||||
CVE-2008-3364 | 1 Trend Micro | 1 Officescan | 2017-09-29 | 9.3 HIGH | N/A |
Buffer overflow in the ObjRemoveCtrl Class ActiveX control in OfficeScanRemoveCtrl.dll 7.3.0.1020 in Trend Micro OfficeScan Corp Edition (OSCE) Web-Deployment 7.0, 7.3 build 1343 Patch 4 and other builds, and 8.0; Client Server Messaging Security (CSM) 3.5 and 3.6; and Worry-Free Business Security (WFBS) 5.0 allows remote attackers to execute arbitrary code via a long string in the Server property, and possibly other properties. NOTE: some of these details are obtained from third party information. | |||||
CVE-2008-4403 | 1 Trend Micro | 1 Officescan | 2017-08-08 | 5.0 MEDIUM | N/A |
The CGI modules in the server in Trend Micro OfficeScan 8.0 SP1 before build 2439 and 8.0 SP1 Patch 1 before build 3087 allow remote attackers to cause a denial of service (NULL pointer dereference and child process crash) via crafted HTTP headers, related to the "error handling mechanism." |