Show filters
132 Total Results
Displaying 31-40 of 132
Sort by:
Attacker Value
Unknown
CVE-2008-3865
Disclosure Date: January 21, 2009 (last updated October 04, 2023)
Multiple heap-based buffer overflows in the ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allow remote attackers to execute arbitrary code via a packet with a small value in an unspecified size field.
0
Attacker Value
Unknown
CVE-2008-3866
Disclosure Date: January 21, 2009 (last updated October 04, 2023)
The Trend Micro Personal Firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, relies on client-side password protection implemented in the configuration GUI, which allows local users to bypass intended access restrictions and change firewall settings by using a modified client to send crafted packets.
0
Attacker Value
Unknown
CVE-2008-2434
Disclosure Date: December 23, 2008 (last updated October 04, 2023)
The Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote attackers to download an arbitrary library file onto a client system via a "custom update server" argument. NOTE: this can be leveraged for code execution by writing to a Startup folder.
0
Attacker Value
Unknown
CVE-2008-2435
Disclosure Date: December 23, 2008 (last updated October 04, 2023)
Use-after-free vulnerability in the Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote attackers to execute arbitrary code via a crafted notifyOnLoadNative callback function.
0
Attacker Value
Unknown
CVE-2008-5545
Disclosure Date: December 12, 2008 (last updated October 04, 2023)
Trend Micro VSAPI 8.700.0.1004 in Trend Micro AntiVirus, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
0
Attacker Value
Unknown
CVE-2008-0012
Disclosure Date: November 17, 2008 (last updated October 04, 2023)
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CVE-2008-0013 and CVE-2008-0014.
0
Attacker Value
Unknown
CVE-2007-0072
Disclosure Date: November 17, 2008 (last updated October 04, 2023)
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a read operation over RPC.
0
Attacker Value
Unknown
CVE-2006-5269
Disclosure Date: November 17, 2008 (last updated October 04, 2023)
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, probably related to an RPC interface.
0
Attacker Value
Unknown
CVE-2007-0073
Disclosure Date: November 17, 2008 (last updated October 04, 2023)
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a file read operation over RPC.
0
Attacker Value
Unknown
CVE-2008-0014
Disclosure Date: November 17, 2008 (last updated October 04, 2023)
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CVE-2008-0012 and CVE-2008-0013.
0