Vulnerabilities (CVE)

Filtered by vendor Trend Micro Subscribe
Total 108 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2003-1342 2 Microsoft, Trend Micro 2 Internet Information Server, Virus Control System 2025-04-03 5.0 MEDIUM N/A
Trend Micro Virus Control System (TVCS) 1.8 running with IIS allows remote attackers to cause a denial of service (memory consumption) in IIS via multiple URL requests for ActiveSupport.exe.
CVE-2001-0958 1 Trend Micro 2 Interscan Emanager, Interscan Viruswall 2025-04-03 7.5 HIGH N/A
Buffer overflows in eManager plugin for Trend Micro InterScan VirusWall for NT 3.51 and 3.51J allow remote attackers to execute arbitrary code via long arguments to the CGI programs (1) register.dll, (2) ContentFilter.dll, (3) SFNofitication.dll, (4) register.dll, (5) TOP10.dll, (6) SpamExcp.dll, and (7) spamrule.dll.
CVE-2003-1341 1 Trend Micro 2 Officescan, Virus Buster 2025-04-03 7.5 HIGH N/A
The default installation of Trend Micro OfficeScan 3.0 through 3.54 and 5.x allows remote attackers to bypass authentication from cgiChkMasterPasswd.exe and gain access to the web management console via a direct request to cgiMasterPwd.exe.
CVE-2000-0033 1 Trend Micro 1 Interscan Viruswall 2025-04-03 5.0 MEDIUM N/A
InterScan VirusWall SMTP scanner does not properly scan messages with malformed attachments.
CVE-2006-1381 1 Trend Micro 1 Officescan 2025-04-03 10.0 HIGH N/A
Trend Micro OfficeScan 5.5, and probably other versions before 6.5, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying tmlisten.exe.
CVE-2001-1574 1 Trend Micro 1 Interscan Viruswall 2025-04-03 10.0 HIGH N/A
Buffer overflow in (1) HttpSaveCVP.dll and (2) HttpSaveCSP.dll in Trend Micro InterScan VirusWall 3.5.1 allows remote attackers to execute arbitrary code.
CVE-2001-0678 1 Trend Micro 2 Interscan Viruswall, Interscan Webmanager 2025-04-03 4.6 MEDIUM N/A
A buffer overflow in reggo.dll file used by Trend Micro InterScan VirusWall prior to 3.51 build 1349 for Windows NT 3.5 and InterScan WebManager 1.2 allows a local attacker to execute arbitrary code.
CVE-2005-3379 1 Trend Micro 2 Officescan, Pc-cillin 2005 2025-04-03 5.1 MEDIUM N/A
Multiple interpretation error in Trend Micro (1) PC-Cillin 2005 12.0.1244 with the 7.510.1002 engine and (2) OfficeScan 7.0 with the 7.510.1002 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."