Page 6 of 33 results (0.006 seconds)

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 1

Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection. • http://marc.info/?l=bugtraq&m=108395366909344&w=2 http://secunia.com/advisories/11576 http://www.osvdb.org/5990 http://www.securityfocus.com/bid/10300 https://exchange.xforce.ibmcloud.com/vulnerabilities/16092 •

CVSS: 7.5EPSS: 10%CPEs: 13EXPL: 2

The default installation of Trend Micro OfficeScan 3.0 through 3.54 and 5.x allows remote attackers to bypass authentication from cgiChkMasterPasswd.exe and gain access to the web management console via a direct request to cgiMasterPwd.exe. • https://www.exploit-db.com/exploits/22171 http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0020.html http://kb.trendmicro.com/solutions/solutionDetail.asp?solutionId=13353 http://secunia.com/advisories/7881 http://www.osvdb.org/6181 http://www.securityfocus.com/bid/6616 https://exchange.xforce.ibmcloud.com/vulnerabilities/11059 • CWE-16: Configuration •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 1

Buffer overflow in pop3trap.exe for PC-cillin 2000, 2002, and 2003 allows local users to execute arbitrary code via a long input string to TCP port 110 (POP3). Desbordamiento de búfer en pop3trap.exe en PC-cillin 2000, 2002, y 2003 permite a usuarios locales la ejecución arbitraria de código mediante una cadena de caracteres larga de entrada en el puerto TCP 110 (POP3). • https://www.exploit-db.com/exploits/22082 http://kb.trendmicro.com/solutions/solutionDetail.asp?solutionId=12982 http://marc.info/?l=bugtraq&m=103953822705917&w=2 http://www.kb.cert.org/vuls/id/157961 http://www.securityfocus.com/bid/6350 http://www.texonet.com/advisories/TEXONET-20021210.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/10814 •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.53 allows remote attackers to access sensitive information from the hotdownload directory without authentication, such as the ofcscan.ini configuration file, which contains a weakly encrypted password. • http://www.securityfocus.com/archive/1/220666 http://www.trendmicro.co.jp/esolution/solutionDetail.asp?solutionID=318 https://exchange.xforce.ibmcloud.com/vulnerabilities/7286 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

Vulnerability in cgiWebupdate.exe in Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.5.2 through 3.5.4 allows remote attackers to read arbitrary files. • http://www.iss.net/security_center/static/7014.php http://www.securityfocus.com/archive/1/209375 http://www.securityfocus.com/archive/1/210087 http://www.securityfocus.com/bid/3216 •