Total
29 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2000-0205 | 1 Trend Micro | 1 Officescan | 2025-04-03 | 6.4 MEDIUM | N/A |
Trend Micro OfficeScan allows remote attackers to replay administrative commands and modify the configuration of OfficeScan clients. | |||||
CVE-2004-2430 | 1 Trend Micro | 1 Officescan | 2025-04-03 | 7.2 HIGH | N/A |
Trend OfficeScan Corporate Edition 5.58 and possibly earler does not drop privileges when opening a help window from a virus detection pop-up window, which allows local users to gain SYSTEM privileges. | |||||
CVE-2005-0533 | 1 Trend Micro | 15 Client-server-messaging Suite Smb, Client-server Suite Smb, Control Manager and 12 more | 2025-04-03 | 7.5 HIGH | N/A |
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure. | |||||
CVE-2002-1349 | 1 Trend Micro | 2 Officescan, Pc-cillin | 2025-04-03 | 4.6 MEDIUM | N/A |
Buffer overflow in pop3trap.exe for PC-cillin 2000, 2002, and 2003 allows local users to execute arbitrary code via a long input string to TCP port 110 (POP3). | |||||
CVE-2003-1341 | 1 Trend Micro | 2 Officescan, Virus Buster | 2025-04-03 | 7.5 HIGH | N/A |
The default installation of Trend Micro OfficeScan 3.0 through 3.54 and 5.x allows remote attackers to bypass authentication from cgiChkMasterPasswd.exe and gain access to the web management console via a direct request to cgiMasterPwd.exe. | |||||
CVE-2004-2006 | 1 Trend Micro | 1 Officescan | 2025-04-03 | 4.6 MEDIUM | N/A |
Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection. | |||||
CVE-2001-1150 | 1 Trend Micro | 2 Officescan, Virus Buster | 2025-04-03 | 5.0 MEDIUM | N/A |
Vulnerability in cgiWebupdate.exe in Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.5.2 through 3.5.4 allows remote attackers to read arbitrary files. | |||||
CVE-2006-1381 | 1 Trend Micro | 1 Officescan | 2025-04-03 | 10.0 HIGH | N/A |
Trend Micro OfficeScan 5.5, and probably other versions before 6.5, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying tmlisten.exe. | |||||
CVE-2001-1151 | 1 Trend Micro | 2 Officescan, Virus Buster | 2025-04-03 | 5.0 MEDIUM | N/A |
Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.53 allows remote attackers to access sensitive information from the hotdownload directory without authentication, such as the ofcscan.ini configuration file, which contains a weakly encrypted password. |