Vulnerabilities (CVE)

Filtered by vendor Trend Micro Subscribe
Total 108 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2001-0410 1 Trend Micro 1 Virus Buster 2001 2024-02-04 7.5 HIGH N/A
Buffer overflow in Trend Micro Virus Buster 2001 8.02 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long "From" header.
CVE-2001-1573 1 Trend Micro 1 Interscan Viruswall 2024-02-04 10.0 HIGH N/A
Buffer overflow in smtpscan.dll for Trend Micro InterScan VirusWall 3.51 for Windows NT has allows remote attackers to execute arbitrary code via a certain configuration parameter.
CVE-2002-0440 1 Trend Micro 1 Interscan Viruswall 2024-02-04 7.5 HIGH N/A
Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients.
CVE-2000-1106 1 Trend Micro 1 Interscan Viruswall 2024-02-04 4.6 MEDIUM N/A
Trend Micro InterScan VirusWall creates an "Intscan" share to the "InterScan" directory with permissions that grant Full Control permissions to the Everyone group, which allows attackers to gain privileges by modifying the VirusWall programs.
CVE-2002-1839 1 Trend Micro 1 Interscan Viruswall For Windows Nt 2024-02-04 5.0 MEDIUM N/A
Trend Micro InterScan VirusWall for Windows NT 3.52 does not record the sender's IP address in the headers for a mail message when it is passed from VirusWall to the MTA, which allows remote attackers to hide the origin of the message.
CVE-2004-2006 1 Trend Micro 1 Officescan 2024-02-04 4.6 MEDIUM N/A
Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection.
CVE-2003-1343 1 Trend Micro 1 Scanmail 2024-02-04 7.5 HIGH N/A
Trend Micro ScanMail for Exchange (SMEX) before 3.81 and before 6.1 might install a back door account in smg_Smxcfg30.exe, which allows remote attackers to gain access to the web management interface via the vcc parameter, possibly "3560121183d3".
CVE-2001-0679 1 Trend Micro 1 Interscan Viruswall 2024-02-04 10.0 HIGH N/A
A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote attacker to execute arbitrary code by sending a long HELO command to the server.
CVE-2000-0205 1 Trend Micro 1 Officescan 2024-02-04 6.4 MEDIUM N/A
Trend Micro OfficeScan allows remote attackers to replay administrative commands and modify the configuration of OfficeScan clients.
CVE-1999-1533 1 Trend Micro 1 Interscan Viruswall 2024-02-04 7.5 HIGH N/A
Eicon Technology Diva LAN ISDN modem allows a remote attacker to cause a denial of service (hang) via a long password argument to the login.htm file in its HTTP service.
CVE-2002-1121 4 Gfi, Network Associates, Roaring Penguin and 1 more 5 Mailsecurity, Webshield Smtp, Canit and 2 more 2024-02-04 7.5 HIGH N/A
SMTP content filter engines, including (1) GFI MailSecurity for Exchange/SMTP before 7.2, (2) InterScan VirusWall before 3.52 build 1494, (3) the default configuration of MIMEDefang before 2.21, and possibly other products, do not detect fragmented emails as defined in RFC2046 ("Message Fragmentation and Reassembly") and supported in such products as Outlook Express, which allows remote attackers to bypass content filtering, including virus checking, via fragmented emails of the message/partial content type.
CVE-2000-0007 1 Trend Micro 1 Pc-cillin 2024-02-04 5.0 MEDIUM N/A
Trend Micro PC-Cillin does not restrict access to its internal proxy port, allowing remote attackers to conduct a denial of service.
CVE-2002-2394 1 Trend Micro 1 Interscan Viruswall 2024-02-04 5.0 MEDIUM N/A
InterScan VirusWall 3.6 for Linux and 3.52 for Windows allows remote attackers to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 chunked transfer encoding.
CVE-2002-2395 1 Trend Micro 1 Interscan Viruswall 2024-02-04 5.0 MEDIUM N/A
InterScan VirusWall 3.52 for Windows allows remote attackers to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 gzip content encoding.
CVE-2004-1859 1 Trend Micro 1 Interscan Viruswall For Windows Nt 2024-02-04 5.0 MEDIUM N/A
Directory traversal vulnerability in Trend Micro Interscan Web Viruswall in InterScan VirusWall 3.5x allows remote attackers to read arbitrary files via a .. (dot dot) in the URL.
CVE-2003-1344 1 Trend Micro 1 Virus Control System 2024-02-04 5.0 MEDIUM N/A
Trend Micro Virus Control System (TVCS) Log Collector allows remote attackers to obtain usernames, encrypted passwords, and other sensitive information via a URL request for getservers.exe with the action parameter set to "selects1", which returns log files.
CVE-2001-0761 1 Trend Micro 1 Interscan Webmanager 2024-02-04 7.5 HIGH N/A
Buffer overflow in HttpSave.dll in Trend Micro InterScan WebManager 1.2 allows remote attackers to execute arbitrary code via a long value to a certain parameter.
CVE-2001-0791 1 Trend Micro 1 Interscan Viruswall 2024-02-04 5.0 MEDIUM N/A
Trend Micro InterScan VirusWall for Windows NT allows remote attackers to make configuration changes by directly calling certain CGI programs, which do not restrict access.
CVE-2003-0646 1 Trend Micro 2 Damage Cleanup Server, Housecall 2024-02-04 7.5 HIGH N/A
Multiple buffer overflows in ActiveX controls used by Trend Micro HouseCall 5.5 and 5.7, and Damage Cleanup Server 1.0, allow remote attackers to execute arbitrary code via long parameter strings.
CVE-2001-1151 1 Trend Micro 2 Officescan, Virus Buster 2024-02-04 5.0 MEDIUM N/A
Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.53 allows remote attackers to access sensitive information from the hotdownload directory without authentication, such as the ofcscan.ini configuration file, which contains a weakly encrypted password.