Lucene search

K
Trend MicroOfficescan3.0

5 matches found

CVE
CVE
added 2007/02/08 6:28 p.m.41 views

CVE-2007-0851

Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.

9.3CVSS7.8AI score0.34983EPSS
CVE
CVE
added 2005/05/10 4:0 a.m.36 views

CVE-2004-2006

Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection.

4.6CVSS6.7AI score0.00052EPSS
CVE
CVE
added 2005/08/18 4:0 a.m.34 views

CVE-2004-2430

Trend OfficeScan Corporate Edition 5.58 and possibly earler does not drop privileges when opening a help window from a virus detection pop-up window, which allows local users to gain SYSTEM privileges.

7.2CVSS7AI score0.00064EPSS
CVE
CVE
added 2007/10/14 7:0 p.m.31 views

CVE-2003-1341

The default installation of Trend Micro OfficeScan 3.0 through 3.54 and 5.x allows remote attackers to bypass authentication from cgiChkMasterPasswd.exe and gain access to the web management console via a direct request to cgiMasterPwd.exe.

7.5CVSS7.5AI score0.06134EPSS
CVE
CVE
added 2005/05/02 4:0 a.m.31 views

CVE-2005-0533

Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.

7.5CVSS7.9AI score0.06973EPSS