Vulnerabilities > Trend Micro > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2004-05-07 | CVE-2004-2006 | Unspecified vulnerability in Trend Micro Officescan Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection. | 4.6 |
2004-03-24 | CVE-2004-1859 | Localweb Directory Traversal vulnerability in Trend Micro Interscan Viruswall Directory traversal vulnerability in Trend Micro Interscan Web Viruswall in InterScan VirusWall 3.5x allows remote attackers to read arbitrary files via a .. | 5.0 |
2003-12-31 | CVE-2003-1344 | Cryptographic Issues vulnerability in Trend Micro Virus Control System Trend Micro Virus Control System (TVCS) Log Collector allows remote attackers to obtain usernames, encrypted passwords, and other sensitive information via a URL request for getservers.exe with the action parameter set to "selects1", which returns log files. | 5.0 |
2003-12-31 | CVE-2003-1342 | Resource Management Errors vulnerability in Trend Micro Virus Control System 1.8 Trend Micro Virus Control System (TVCS) 1.8 running with IIS allows remote attackers to cause a denial of service (memory consumption) in IIS via multiple URL requests for ActiveSupport.exe. | 5.0 |
2002-12-31 | CVE-2002-2395 | Permissions, Privileges, and Access Controls vulnerability in Trend Micro Interscan Viruswall 3.52 InterScan VirusWall 3.52 for Windows allows remote attackers to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 gzip content encoding. | 5.0 |
2002-12-31 | CVE-2002-2394 | Permissions, Privileges, and Access Controls vulnerability in Trend Micro Interscan Viruswall 3.52/3.6 InterScan VirusWall 3.6 for Linux and 3.52 for Windows allows remote attackers to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 chunked transfer encoding. | 5.0 |
2002-12-31 | CVE-2002-1839 | Unspecified vulnerability in Trend Micro Interscan Viruswall for Windows NT 3.52 Trend Micro InterScan VirusWall for Windows NT 3.52 does not record the sender's IP address in the headers for a mail message when it is passed from VirusWall to the MTA, which allows remote attackers to hide the origin of the message. | 5.0 |
2001-10-18 | CVE-2001-0791 | Denial-Of-Service vulnerability in Interscan Viruswall (HP-UX) Trend Micro InterScan VirusWall for Windows NT allows remote attackers to make configuration changes by directly calling certain CGI programs, which do not restrict access. | 5.0 |
2001-10-15 | CVE-2001-1151 | Information Disclosure vulnerability in Virus Buster Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.53 allows remote attackers to access sensitive information from the hotdownload directory without authentication, such as the ofcscan.ini configuration file, which contains a weakly encrypted password. | 5.0 |
2001-09-20 | CVE-2001-0678 | Unspecified vulnerability in Trend Micro Interscan Viruswall and Interscan Webmanager A buffer overflow in reggo.dll file used by Trend Micro InterScan VirusWall prior to 3.51 build 1349 for Windows NT 3.5 and InterScan WebManager 1.2 allows a local attacker to execute arbitrary code. | 4.6 |