Vulnerabilities > Trend Micro

DATE CVE VULNERABILITY TITLE RISK
2006-11-30 CVE-2006-6178 Buffer Overflow vulnerability in Trend Micro Officescan 7.3
Buffer overflow in PCCSRV\Web_console\RemoteInstallCGI\Wizard.exe for Trend Micro OfficeScan 7.3 before build 7.3.0.1087 allows remote attackers to execute arbitrary code via unknown attack vectors.
network
low complexity
trend-micro
7.5
2006-10-10 CVE-2006-5212 Unspecified vulnerability in Trend Micro Officescan
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 before 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 before 6.5.0.1418, 7.0 before 7.0.0.1257, and 7.3 before 7.3.0.1053 allow remote attackers to delete files via a modified filename parameter in a certain HTTP request that invokes the OfficeScan CGI program.
network
low complexity
trend-micro
5.0
2006-10-10 CVE-2006-5211 Unspecified vulnerability in Trend Micro Officescan Corporate Edition 6.5/7.0/7.3
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 before 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 before 6.5.0.1418, 7.0 before 7.0.0.1257, and 7.3 before 7.3.0.1053 allow remote attackers to remove OfficeScan clients via a certain HTTP request that invokes the OfficeScan CGI program.
network
low complexity
trend-micro
6.4
2006-10-05 CVE-2006-5157 Unspecified vulnerability in Trend Micro Officescan Corporate7.3
Format string vulnerability in the ActiveX control (ATXCONSOLE.OCX) in TrendMicro OfficeScan Corporate Edition (OSCE) before 7.3 Patch 1 allows remote attackers to execute arbitrary code via format string identifiers in the "Management Console's Remote Client Install name search".
network
high complexity
trend-micro
5.1
2006-06-27 CVE-2006-3261 HTML Injection vulnerability in Trend Micro Control Manager 3.5
Cross-site scripting (XSS) vulnerability in Trend Micro Control Manager (TMCM) 3.5 allows remote attackers to inject arbitrary web script or HTML via the username field on the login page, which is not properly sanitized before being displayed in the error log.
network
trend-micro
4.3
2006-02-10 CVE-2006-0642 Unspecified vulnerability in Trend Micro products
Trend Micro ServerProtect 5.58, and possibly InterScan Messaging Security Suite and InterScan Web Security Suite, have a default configuration setting of "Do not scan compressed files when Extracted file count exceeds 500 files," which may be too low in certain circumstances, which allows remote attackers to bypass anti-virus checks by sending compressed archives containing many small files.
network
high complexity
trend-micro
5.1
2005-12-14 CVE-2005-1928 Resource Management Errors vulnerability in Trend Micro Serverprotect Earthagent 5.58
Trend Micro ServerProtect EarthAgent for Windows Management Console 5.58 and possibly earlier versions, when running with Trend Micro Control Manager 2.5 and 3.0, and Damage Cleanup Server 1.1, allows remote attackers to cause a denial of service (CPU consumption) via a flood of crafted packets with a certain "magic value" to port 5005, which also leads to a memory leak.
network
low complexity
trend-micro CWE-399
7.8
2005-12-14 CVE-2005-1929 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Trend Micro Serverprotect
Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and earlier, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote attackers to execute arbitrary code via "wrapped" length values in Chunked transfer requests.
network
low complexity
trend-micro CWE-119
7.5
2005-12-14 CVE-2005-3360 Products Local Insecure Permissions vulnerability in Trend Micro Pc-Cillin 2005 12.00Build1244
The installation of Trend Micro PC-Cillin Internet Security 2005 12.00 build 1244, and probably previous versions, uses insecure default ACLs, which allows local users to cause a denial of service (disabled service) and gain system privileges by modifying or moving critical program files.
local
low complexity
trend-micro
7.2
2005-12-14 CVE-2005-1930 Directory Traversal vulnerability in Trend Micro Serverprotect 5.58
Directory traversal vulnerability in the Crystal Report component (rptserver.asp) in Trend Micro ServerProtect Management Console 5.58, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, and possibly earlier versions, allows remote attackers to read arbitrary files via the IMAGE parameter.
network
low complexity
trend-micro
5.0