Filtered by vendor Trend Micro
Subscriptions
Total
108 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2004-1859 | 1 Trend Micro | 1 Interscan Viruswall For Windows Nt | 2025-04-03 | N/A |
Directory traversal vulnerability in Trend Micro Interscan Web Viruswall in InterScan VirusWall 3.5x allows remote attackers to read arbitrary files via a .. (dot dot) in the URL. | ||||
CVE-2004-1003 | 1 Trend Micro | 1 Scanmail Domino | 2025-04-03 | N/A |
Trend ScanMail allows remote attackers to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file. | ||||
CVE-2003-1344 | 1 Trend Micro | 1 Virus Control System | 2025-04-03 | N/A |
Trend Micro Virus Control System (TVCS) Log Collector allows remote attackers to obtain usernames, encrypted passwords, and other sensitive information via a URL request for getservers.exe with the action parameter set to "selects1", which returns log files. | ||||
CVE-2003-1343 | 1 Trend Micro | 1 Scanmail | 2025-04-03 | N/A |
Trend Micro ScanMail for Exchange (SMEX) before 3.81 and before 6.1 might install a back door account in smg_Smxcfg30.exe, which allows remote attackers to gain access to the web management interface via the vcc parameter, possibly "3560121183d3". | ||||
CVE-2003-1342 | 2 Microsoft, Trend Micro | 2 Internet Information Server, Virus Control System | 2025-04-03 | N/A |
Trend Micro Virus Control System (TVCS) 1.8 running with IIS allows remote attackers to cause a denial of service (memory consumption) in IIS via multiple URL requests for ActiveSupport.exe. | ||||
CVE-2003-1341 | 1 Trend Micro | 2 Officescan, Virus Buster | 2025-04-03 | N/A |
The default installation of Trend Micro OfficeScan 3.0 through 3.54 and 5.x allows remote attackers to bypass authentication from cgiChkMasterPasswd.exe and gain access to the web management console via a direct request to cgiMasterPwd.exe. | ||||
CVE-2003-0646 | 1 Trend Micro | 2 Damage Cleanup Server, Housecall | 2025-04-03 | N/A |
Multiple buffer overflows in ActiveX controls used by Trend Micro HouseCall 5.5 and 5.7, and Damage Cleanup Server 1.0, allow remote attackers to execute arbitrary code via long parameter strings. | ||||
CVE-2002-2394 | 1 Trend Micro | 1 Interscan Viruswall | 2025-04-03 | N/A |
InterScan VirusWall 3.6 for Linux and 3.52 for Windows allows remote attackers to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 chunked transfer encoding. | ||||
CVE-2002-2395 | 1 Trend Micro | 1 Interscan Viruswall | 2025-04-03 | N/A |
InterScan VirusWall 3.52 for Windows allows remote attackers to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 gzip content encoding. | ||||
CVE-2002-1839 | 1 Trend Micro | 1 Interscan Viruswall For Windows Nt | 2025-04-03 | N/A |
Trend Micro InterScan VirusWall for Windows NT 3.52 does not record the sender's IP address in the headers for a mail message when it is passed from VirusWall to the MTA, which allows remote attackers to hide the origin of the message. | ||||
CVE-2002-1349 | 1 Trend Micro | 2 Officescan, Pc-cillin | 2025-04-03 | N/A |
Buffer overflow in pop3trap.exe for PC-cillin 2000, 2002, and 2003 allows local users to execute arbitrary code via a long input string to TCP port 110 (POP3). | ||||
CVE-2002-0440 | 1 Trend Micro | 1 Interscan Viruswall | 2025-04-03 | N/A |
Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients. | ||||
CVE-2001-1573 | 1 Trend Micro | 1 Interscan Viruswall | 2025-04-03 | N/A |
Buffer overflow in smtpscan.dll for Trend Micro InterScan VirusWall 3.51 for Windows NT has allows remote attackers to execute arbitrary code via a certain configuration parameter. | ||||
CVE-2001-1026 | 1 Trend Micro | 1 Interscan Applettrap | 2025-04-03 | N/A |
Trend Micro InterScan AppletTrap 2.0 does not properly filter URLs when they are modified in certain ways such as (1) using a double slash (//) instead of a single slash, (2) URL-encoded characters, (3) requesting the IP address instead of the domain name, or (4) using a leading 0 in an octet of an IP address. | ||||
CVE-2001-0791 | 1 Trend Micro | 1 Interscan Viruswall | 2025-04-03 | N/A |
Trend Micro InterScan VirusWall for Windows NT allows remote attackers to make configuration changes by directly calling certain CGI programs, which do not restrict access. | ||||
CVE-2001-0761 | 1 Trend Micro | 1 Interscan Webmanager | 2025-04-03 | N/A |
Buffer overflow in HttpSave.dll in Trend Micro InterScan WebManager 1.2 allows remote attackers to execute arbitrary code via a long value to a certain parameter. | ||||
CVE-2001-0678 | 1 Trend Micro | 2 Interscan Viruswall, Interscan Webmanager | 2025-04-03 | N/A |
A buffer overflow in reggo.dll file used by Trend Micro InterScan VirusWall prior to 3.51 build 1349 for Windows NT 3.5 and InterScan WebManager 1.2 allows a local attacker to execute arbitrary code. | ||||
CVE-2001-0679 | 1 Trend Micro | 1 Interscan Viruswall | 2025-04-03 | N/A |
A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote attacker to execute arbitrary code by sending a long HELO command to the server. | ||||
CVE-2001-0689 | 1 Trend Micro | 1 Virus Control System | 2025-04-03 | N/A |
Vulnerability in TrendMicro Virus Control System 1.8 allows a remote attacker to view configuration files and change the configuration via a certain CGI program. | ||||
CVE-2001-0410 | 1 Trend Micro | 1 Virus Buster 2001 | 2025-04-03 | N/A |
Buffer overflow in Trend Micro Virus Buster 2001 8.02 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long "From" header. |