Page 18 of 129 results (0.006 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Trend Micro Control Manager 3.0 Enterprise Edition allows remote attackers to gain privileges via a replay attack of the encrypted username and password. • http://marc.info/?l=bugtraq&m=110564369316593&w=2 http://marc.info/?l=bugtraq&m=110565281205427&w=2 http://www.cirt.dk/advisories/cirt-28-advisory.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/18887 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Trend OfficeScan Corporate Edition 5.58 and possibly earler does not drop privileges when opening a help window from a virus detection pop-up window, which allows local users to gain SYSTEM privileges. • http://archives.neohapsis.com/archives/bugtraq/2004-06/0117.html http://secunia.com/advisories/11806 http://uk.trendmicro-europe.com/enterprise/support/knowledge_base_detail.php?solutionId=20118 http://www.osvdb.org/6840 http://www.securityfocus.com/bid/10503 https://exchange.xforce.ibmcloud.com/vulnerabilities/16375 •

CVSS: 5.0EPSS: 5%CPEs: 2EXPL: 1

Trend ScanMail allows remote attackers to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file. • https://www.exploit-db.com/exploits/24725 http://cgi.nessus.org/plugins/dump.php3?id=14312 https://exchange.xforce.ibmcloud.com/vulnerabilities/17962 •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 1

Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection. • http://marc.info/?l=bugtraq&m=108395366909344&w=2 http://secunia.com/advisories/11576 http://www.osvdb.org/5990 http://www.securityfocus.com/bid/10300 https://exchange.xforce.ibmcloud.com/vulnerabilities/16092 •

CVSS: 5.0EPSS: 87%CPEs: 6EXPL: 5

Directory traversal vulnerability in Trend Micro Interscan Web Viruswall in InterScan VirusWall 3.5x allows remote attackers to read arbitrary files via a .. (dot dot) in the URL. • https://www.exploit-db.com/exploits/23875 http://kb.trendmicro.com/solutions/search/main/search/solutionDetail.asp?solutionID=19257 http://marc.info/?l=bugtraq&m=108014604529316&w=2 http://secunia.com/advisories/11215 http://securitytracker.com/id?1009550 http://www.osvdb.org/4549 http://www.securityfocus.com/bid/9966 https://exchange.xforce.ibmcloud.com/vulnerabilities/15590 •