Vulnerabilities > Trend Micro > High

DATE CVE VULNERABILITY TITLE RISK
2012-09-28 CVE-2012-2998 SQL Injection vulnerability in Trend Micro Control Manager
SQL injection vulnerability in the ad hoc query module in Trend Micro Control Manager (TMCM) before 5.5.0.1823 and 6.0 before 6.0.0.1449 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
network
low complexity
trend-micro CWE-89
7.5
2007-12-15 CVE-2007-6386 Buffer Errors vulnerability in Trend Micro products
Stack-based buffer overflow in PccScan.dll before build 1451 in Trend Micro AntiVirus plus AntiSpyware 2008, Internet Security 2008, and Internet Security Pro 2008 allows user-assisted remote attackers to cause a denial of service (SfCtlCom.exe crash), and allows local users to gain privileges, via a malformed .zip archive with a long name, as demonstrated by a .zip file created via format string specifiers in a crafted .uue file.
local
low complexity
trend-micro CWE-119
7.2
2007-03-22 CVE-2007-1591 Denial-Of-Service vulnerability in Trend Micro Trend Micro Antivirus 14.10.1041
VsapiNT.sys in the Scan Engine 8.0 for Trend Micro AntiVirus 14.10.1041, and other products, allows remote attackers to cause a denial of service (kernel fault and system crash) via a crafted UPX file with a certain field that triggers a divide-by-zero error.
network
low complexity
trend-micro
7.8
2007-03-02 CVE-2007-1168 Authentication Bypass vulnerability in Trend Micro Serverprotect 1.2520070216/1.3/2.5
Trend Micro ServerProtect for Linux (SPLX) 1.25, 1.3, and 2.5 before 20070216 allows remote attackers to access arbitrary web pages and reconfigure the product via HTTP requests with the splx_2376_info cookie to the web interface port (14942/tcp).
network
low complexity
trend-micro
7.5
2007-02-08 CVE-2007-0856 Local Privilege Escalation vulnerability in Trend Micro AntiVirus Scan Engine TMComm
TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the \\.\TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.
local
low complexity
trend-micro
7.2
2006-12-11 CVE-2006-6458 Remote Denial Of Service vulnerability in Trend Micro products
The Trend Micro scan engine before 8.320 for Windows and before 8.150 on HP-UX and AIX, as used in Trend Micro PC Cillin - Internet Security 2006, Office Scan 7.3, and Server Protect 5.58, allows remote attackers to cause a denial of service (CPU consumption and system hang) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero, which triggers an infinite loop.
network
low complexity
trend-micro
7.8
2006-11-30 CVE-2006-6179 Buffer Overflow vulnerability in Trend Micro Officescan 7.3
Buffer overflow in PCCSRV\Web_console\RemoteInstallCGI\CgiRemoteInstall.exe for Trend Micro OfficeScan 7.3 before build 7.3.0.1089 allows remote attackers to execute arbitrary code via unknown attack vectors.
network
low complexity
trend-micro
7.5
2006-11-30 CVE-2006-6178 Buffer Overflow vulnerability in Trend Micro Officescan 7.3
Buffer overflow in PCCSRV\Web_console\RemoteInstallCGI\Wizard.exe for Trend Micro OfficeScan 7.3 before build 7.3.0.1087 allows remote attackers to execute arbitrary code via unknown attack vectors.
network
low complexity
trend-micro
7.5
2005-12-14 CVE-2005-1928 Resource Management Errors vulnerability in Trend Micro Serverprotect Earthagent 5.58
Trend Micro ServerProtect EarthAgent for Windows Management Console 5.58 and possibly earlier versions, when running with Trend Micro Control Manager 2.5 and 3.0, and Damage Cleanup Server 1.1, allows remote attackers to cause a denial of service (CPU consumption) via a flood of crafted packets with a certain "magic value" to port 5005, which also leads to a memory leak.
network
low complexity
trend-micro CWE-399
7.8
2005-12-14 CVE-2005-1929 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Trend Micro Serverprotect
Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and earlier, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote attackers to execute arbitrary code via "wrapped" length values in Chunked transfer requests.
network
low complexity
trend-micro CWE-119
7.5