Vulnerabilities > CVE-2004-1003 - Unspecified vulnerability in Trend Micro Scanmail Domino 2.51/2.6
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
Trend ScanMail allows remote attackers to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | Trend Micro ScanMail for Domino 2.51/2.6 Remote File Disclosure Vulnerability. CVE-2004-1003. Remote exploits for multiple platform |
id | EDB-ID:24725 |
last seen | 2016-02-02 |
modified | 2004-11-05 |
published | 2004-11-05 |
reporter | DokFLeed |
source | https://www.exploit-db.com/download/24725/ |
title | Trend Micro ScanMail for Domino 2.51/2.6 - Remote File Disclosure Vulnerability |
Nessus
NASL family | CGI abuses |
NASL id | LOTUS_SMENCY.NASL |
description | This script attempts to read sensitive files used by Trend ScanMail, an antivirus protection program for Domino (formerly Lotus Notes). An attacker, exploiting this flaw, may gain access to confidential data or disable the antivirus protection. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14312 |
published | 2004-08-19 |
reporter | This script is Copyright (C) 2004-2018 by DokFLeed |
source | https://www.tenable.com/plugins/nessus/14312 |
title | Trend Micro Scanmail for Domino nsf File Information Disclosure |
code |
|