Page 23 of 129 results (0.006 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

TrendMicro ScanMail for Exchange 3.5 Evaluation allows a local attacker to recover the administrative credentials for ScanMail via a combination of unprotected registry keys and weakly encrypted passwords. • http://archives.neohapsis.com/archives/ntbugtraq/2001-q1/0049.html http://www.osvdb.org/5581 https://exchange.xforce.ibmcloud.com/vulnerabilities/6311 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

Vulnerability in cgiWebupdate.exe in Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.5.2 through 3.5.4 allows remote attackers to read arbitrary files. • http://www.iss.net/security_center/static/7014.php http://www.securityfocus.com/archive/1/209375 http://www.securityfocus.com/archive/1/210087 http://www.securityfocus.com/bid/3216 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Trend Micro InterScan AppletTrap 2.0 does not properly filter URLs when they are modified in certain ways such as (1) using a double slash (//) instead of a single slash, (2) URL-encoded characters, (3) requesting the IP address instead of the domain name, or (4) using a leading 0 in an octet of an IP address. • http://archives.neohapsis.com/archives/bugtraq/2001-07/0129.html http://www.securityfocus.com/bid/2996 http://www.securityfocus.com/bid/2998 http://www.securityfocus.com/bid/3000 https://exchange.xforce.ibmcloud.com/vulnerabilities/6816 https://exchange.xforce.ibmcloud.com/vulnerabilities/6817 https://exchange.xforce.ibmcloud.com/vulnerabilities/6818 https://exchange.xforce.ibmcloud.com/vulnerabilities/6819 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in Trend Micro Virus Buster 2001 8.02 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long "From" header. • http://marc.info/?l=bugtraq&m=98593642520755&w=2 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 3

Buffer overflows in various CGI programs in the remote administration service for Trend Micro Interscan VirusWall 3.01 allow remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/20750 http://archives.neohapsis.com/archives/bugtraq/2001-04/0218.html http://www.securityfocus.com/bid/2579 •