CVE-2005-0383
https://notcve.org/view.php?id=CVE-2005-0383
Trend Micro Control Manager 3.0 Enterprise Edition allows remote attackers to gain privileges via a replay attack of the encrypted username and password. • http://marc.info/?l=bugtraq&m=110564369316593&w=2 http://marc.info/?l=bugtraq&m=110565281205427&w=2 http://www.cirt.dk/advisories/cirt-28-advisory.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/18887 •
CVE-2004-2430
https://notcve.org/view.php?id=CVE-2004-2430
Trend OfficeScan Corporate Edition 5.58 and possibly earler does not drop privileges when opening a help window from a virus detection pop-up window, which allows local users to gain SYSTEM privileges. • http://archives.neohapsis.com/archives/bugtraq/2004-06/0117.html http://secunia.com/advisories/11806 http://uk.trendmicro-europe.com/enterprise/support/knowledge_base_detail.php?solutionId=20118 http://www.osvdb.org/6840 http://www.securityfocus.com/bid/10503 https://exchange.xforce.ibmcloud.com/vulnerabilities/16375 •
CVE-2004-1003 – Trend Micro ScanMail for Domino 2.51/2.6 - Remote File Disclosure
https://notcve.org/view.php?id=CVE-2004-1003
Trend ScanMail allows remote attackers to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file. • https://www.exploit-db.com/exploits/24725 http://cgi.nessus.org/plugins/dump.php3?id=14312 https://exchange.xforce.ibmcloud.com/vulnerabilities/17962 •
CVE-2004-2006
https://notcve.org/view.php?id=CVE-2004-2006
Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection. • http://marc.info/?l=bugtraq&m=108395366909344&w=2 http://secunia.com/advisories/11576 http://www.osvdb.org/5990 http://www.securityfocus.com/bid/10300 https://exchange.xforce.ibmcloud.com/vulnerabilities/16092 •
CVE-2004-1859 – Trend Micro Interscan VirusWall localweb - Directory Traversal
https://notcve.org/view.php?id=CVE-2004-1859
Directory traversal vulnerability in Trend Micro Interscan Web Viruswall in InterScan VirusWall 3.5x allows remote attackers to read arbitrary files via a .. (dot dot) in the URL. • https://www.exploit-db.com/exploits/23875 http://kb.trendmicro.com/solutions/search/main/search/solutionDetail.asp?solutionID=19257 http://marc.info/?l=bugtraq&m=108014604529316&w=2 http://secunia.com/advisories/11215 http://securitytracker.com/id?1009550 http://www.osvdb.org/4549 http://www.securityfocus.com/bid/9966 https://exchange.xforce.ibmcloud.com/vulnerabilities/15590 •