Vulnerabilities > Trend Micro > Medium

DATE CVE VULNERABILITY TITLE RISK
2016-05-23 CVE-2016-3664 Information Exposure vulnerability in Trend Micro Mobile Security 3.1
Trend Micro Mobile Security for iOS before 3.2.1188 does not verify the X.509 certificate of the mobile application login server, which allows man-in-the-middle attackers to spoof this server and obtain sensitive information via a crafted certificate.
5.8
2015-05-14 CVE-2015-3326 Unspecified vulnerability in Trend Micro Scanmail 10.2/11.0
Trend Micro ScanMail for Microsoft Exchange (SMEX) 10.2 before Hot Fix Build 3318 and 11.0 before Hot Fix Build 4180 creates session IDs for the web console using a random number generator with predictable values, which makes it easier for remote attackers to bypass authentication via a brute force attack.
network
low complexity
trend-micro
5.0
2009-01-21 CVE-2008-3866 Improper Authentication vulnerability in Trend Micro products
The Trend Micro Personal Firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, relies on client-side password protection implemented in the configuration GUI, which allows local users to bypass intended access restrictions and change firewall settings by using a modified client to send crafted packets.
local
low complexity
trend-micro CWE-287
4.6
2009-01-21 CVE-2008-3864 Improper Input Validation vulnerability in Trend Micro products
The ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allows remote attackers to cause a denial of service (service crash) via a packet with a large value in an unspecified size field.
network
low complexity
trend-micro CWE-20
5.0
2008-10-03 CVE-2008-4403 Resource Management Errors vulnerability in Trend Micro Officescan 8.0
The CGI modules in the server in Trend Micro OfficeScan 8.0 SP1 before build 2439 and 8.0 SP1 Patch 1 before build 3087 allow remote attackers to cause a denial of service (NULL pointer dereference and child process crash) via crafted HTTP headers, related to the "error handling mechanism."
network
low complexity
trend-micro CWE-399
5.0
2008-10-03 CVE-2008-2439 Path Traversal vulnerability in Trend Micro Officescan and Worry Free Business Security
Directory traversal vulnerability in the UpdateAgent function in TmListen.exe in the OfficeScanNT Listener service in the client in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds before 1372, OfficeScan 8.0 SP1 before build 1222, OfficeScan 8.0 SP1 Patch 1 before build 3087, and Worry-Free Business Security 5.0 before build 1220 allows remote attackers to read arbitrary files via directory traversal sequences in an HTTP request.
network
low complexity
trend-micro CWE-22
5.0
2008-03-17 CVE-2008-1366 Improper Input Validation vulnerability in Trend Micro Officescan Corporate Edition
Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to cause a denial of service (process consumption) via (1) an HTTP request without a Content-Length header or (2) invalid characters in unspecified CGI arguments, which triggers a NULL pointer dereference.
network
low complexity
trend-micro CWE-20
5.0
2008-03-17 CVE-2008-1365 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Trend Micro Officescan Corporate Edition
Stack-based buffer overflow in Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long encrypted password, which triggers the overflow in (1) cgiChkMasterPwd.exe, (2) policyserver.exe as reachable through cgiABLogon.exe, and other vectors.
network
low complexity
trend-micro CWE-119
6.4
2007-10-30 CVE-2007-4277 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Trend Micro Pc-Cillin Internet Security 2007 and Scan Engine
The Trend Micro AntiVirus scan engine before 8.550-1001, as used in Trend Micro PC-Cillin Internet Security 2007, and Tmxpflt.sys 8.320.1004 and 8.500.0.1002, has weak permissions (Everyone:Write) for the \\.\Tmfilter device, which allows local users to send arbitrary content to the device via the IOCTL functionality.
local
low complexity
trend-micro CWE-119
6.6
2007-08-22 CVE-2007-3873 Local Stack Buffer Overflow vulnerability in Trend Micro Antispyware and Pc-Cillin Internet Security 2007
Stack-based buffer overflow in vstlib32.dll 1.2.0.1012 in the SSAPI Engine 5.0.0.1066 through 5.2.0.1012 in Trend Micro AntiSpyware 3.5 and PC-Cillin Internet Security 2007 15.0 through 15.3, when the Venus Spy Trap (VST) feature is enabled, allows local users to cause a denial of service (service crash) or execute arbitrary code via a file with a long pathname, which triggers the overflow during a ReadDirectoryChangesW callback notification.
local
trend-micro
6.9