Page 3 of 28 results (0.008 seconds)

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 0

29 Oct 2005 — Multiple interpretation error in Trend Micro (1) PC-Cillin 2005 12.0.1244 with the 7.510.1002 engine and (2) OfficeScan 7.0 with the 7.510.1002 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE... • http://marc.info/?l=bugtraq&m=113026417802703&w=2 •

CVSS: 8.4EPSS: 7%CPEs: 78EXPL: 0

24 Feb 2005 — Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure. • http://secunia.com/advisories/14396 •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

31 Dec 2004 — Trend OfficeScan Corporate Edition 5.58 and possibly earler does not drop privileges when opening a help window from a virus detection pop-up window, which allows local users to gain SYSTEM privileges. • http://archives.neohapsis.com/archives/bugtraq/2004-06/0117.html •

CVSS: 7.1EPSS: 0%CPEs: 7EXPL: 1

07 May 2004 — Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection. • http://marc.info/?l=bugtraq&m=108395366909344&w=2 •

CVSS: 9.8EPSS: 4%CPEs: 13EXPL: 2

31 Dec 2003 — The default installation of Trend Micro OfficeScan 3.0 through 3.54 and 5.x allows remote attackers to bypass authentication from cgiChkMasterPasswd.exe and gain access to the web management console via a direct request to cgiMasterPwd.exe. • https://www.exploit-db.com/exploits/22171 • CWE-16: Configuration •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 1

03 Mar 2000 — Trend Micro OfficeScan allows remote attackers to replay administrative commands and modify the configuration of OfficeScan clients. • http://archives.neohapsis.com/archives/bugtraq/2000-03/0015.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

28 Feb 2000 — The Trend Micro OfficeScan client tmlisten.exe allows remote attackers to cause a denial of service via malformed data to port 12345. • http://www.antivirus.com/download/ofce_patch_35.htm •

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 1

28 Feb 2000 — The Trend Micro OfficeScan client allows remote attackers to cause a denial of service by making 5 connections to port 12345, which raises CPU utilization to 100%. • https://www.exploit-db.com/exploits/19780 •