Vulnerabilities > Trend Micro
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2006-11-30 | CVE-2006-6178 | Buffer Overflow vulnerability in Trend Micro Officescan 7.3 Buffer overflow in PCCSRV\Web_console\RemoteInstallCGI\Wizard.exe for Trend Micro OfficeScan 7.3 before build 7.3.0.1087 allows remote attackers to execute arbitrary code via unknown attack vectors. | 7.5 |
2006-10-10 | CVE-2006-5212 | Unspecified vulnerability in Trend Micro Officescan Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 before 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 before 6.5.0.1418, 7.0 before 7.0.0.1257, and 7.3 before 7.3.0.1053 allow remote attackers to delete files via a modified filename parameter in a certain HTTP request that invokes the OfficeScan CGI program. | 5.0 |
2006-10-10 | CVE-2006-5211 | Unspecified vulnerability in Trend Micro Officescan Corporate Edition 6.5/7.0/7.3 Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 before 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 before 6.5.0.1418, 7.0 before 7.0.0.1257, and 7.3 before 7.3.0.1053 allow remote attackers to remove OfficeScan clients via a certain HTTP request that invokes the OfficeScan CGI program. | 6.4 |
2006-10-05 | CVE-2006-5157 | Unspecified vulnerability in Trend Micro Officescan Corporate7.3 Format string vulnerability in the ActiveX control (ATXCONSOLE.OCX) in TrendMicro OfficeScan Corporate Edition (OSCE) before 7.3 Patch 1 allows remote attackers to execute arbitrary code via format string identifiers in the "Management Console's Remote Client Install name search". | 5.1 |
2006-06-27 | CVE-2006-3261 | HTML Injection vulnerability in Trend Micro Control Manager 3.5 Cross-site scripting (XSS) vulnerability in Trend Micro Control Manager (TMCM) 3.5 allows remote attackers to inject arbitrary web script or HTML via the username field on the login page, which is not properly sanitized before being displayed in the error log. network trend-micro | 4.3 |
2006-02-10 | CVE-2006-0642 | Unspecified vulnerability in Trend Micro products Trend Micro ServerProtect 5.58, and possibly InterScan Messaging Security Suite and InterScan Web Security Suite, have a default configuration setting of "Do not scan compressed files when Extracted file count exceeds 500 files," which may be too low in certain circumstances, which allows remote attackers to bypass anti-virus checks by sending compressed archives containing many small files. | 5.1 |
2005-12-14 | CVE-2005-1928 | Resource Management Errors vulnerability in Trend Micro Serverprotect Earthagent 5.58 Trend Micro ServerProtect EarthAgent for Windows Management Console 5.58 and possibly earlier versions, when running with Trend Micro Control Manager 2.5 and 3.0, and Damage Cleanup Server 1.1, allows remote attackers to cause a denial of service (CPU consumption) via a flood of crafted packets with a certain "magic value" to port 5005, which also leads to a memory leak. | 7.8 |
2005-12-14 | CVE-2005-1929 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Trend Micro Serverprotect Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and earlier, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote attackers to execute arbitrary code via "wrapped" length values in Chunked transfer requests. | 7.5 |
2005-12-14 | CVE-2005-3360 | Products Local Insecure Permissions vulnerability in Trend Micro Pc-Cillin 2005 12.00Build1244 The installation of Trend Micro PC-Cillin Internet Security 2005 12.00 build 1244, and probably previous versions, uses insecure default ACLs, which allows local users to cause a denial of service (disabled service) and gain system privileges by modifying or moving critical program files. | 7.2 |
2005-12-14 | CVE-2005-1930 | Directory Traversal vulnerability in Trend Micro Serverprotect 5.58 Directory traversal vulnerability in the Crystal Report component (rptserver.asp) in Trend Micro ServerProtect Management Console 5.58, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, and possibly earlier versions, allows remote attackers to read arbitrary files via the IMAGE parameter. | 5.0 |