Vulnerabilities (CVE)

Filtered by vendor Trend Micro Subscribe
Total 108 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2000-0033 1 Trend Micro 1 Interscan Viruswall 2025-04-03 5.0 MEDIUM N/A
InterScan VirusWall SMTP scanner does not properly scan messages with malformed attachments.
CVE-2002-0440 1 Trend Micro 1 Interscan Viruswall 2025-04-03 7.5 HIGH N/A
Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients.
CVE-2005-3360 1 Trend Micro 1 Pc-cillin 2005 2025-04-03 7.2 HIGH N/A
The installation of Trend Micro PC-Cillin Internet Security 2005 12.00 build 1244, and probably previous versions, uses insecure default ACLs, which allows local users to cause a denial of service (disabled service) and gain system privileges by modifying or moving critical program files.
CVE-2000-0007 1 Trend Micro 1 Pc-cillin 2025-04-03 5.0 MEDIUM N/A
Trend Micro PC-Cillin does not restrict access to its internal proxy port, allowing remote attackers to conduct a denial of service.
CVE-2004-1003 1 Trend Micro 1 Scanmail Domino 2025-04-03 5.0 MEDIUM N/A
Trend ScanMail allows remote attackers to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file.
CVE-2004-1859 1 Trend Micro 1 Interscan Viruswall For Windows Nt 2025-04-03 5.0 MEDIUM N/A
Directory traversal vulnerability in Trend Micro Interscan Web Viruswall in InterScan VirusWall 3.5x allows remote attackers to read arbitrary files via a .. (dot dot) in the URL.
CVE-1999-0378 1 Trend Micro 1 Interscan Viruswall 2025-04-03 5.0 MEDIUM N/A
InterScan VirusWall for Solaris doesn't scan files for viruses when a single HTTP request includes two GET commands.
CVE-2001-1151 1 Trend Micro 2 Officescan, Virus Buster 2025-04-03 5.0 MEDIUM N/A
Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.53 allows remote attackers to access sensitive information from the hotdownload directory without authentication, such as the ofcscan.ini configuration file, which contains a weakly encrypted password.