Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2007-0851

Disclosure Date: February 08, 2007 (last updated October 04, 2023)
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.
0
Attacker Value
Unknown

CVE-2006-6458

Disclosure Date: December 11, 2006 (last updated October 04, 2023)
The Trend Micro scan engine before 8.320 for Windows and before 8.150 on HP-UX and AIX, as used in Trend Micro PC Cillin - Internet Security 2006, Office Scan 7.3, and Server Protect 5.58, allows remote attackers to cause a denial of service (CPU consumption and system hang) via a malformed RAR archive with an Archive Header section with the head_size and pack_size fields set to zero, which triggers an infinite loop.
0
Attacker Value
Unknown

CVE-2006-1381

Disclosure Date: March 24, 2006 (last updated February 22, 2025)
Trend Micro OfficeScan 5.5, and probably other versions before 6.5, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying tmlisten.exe.
0
Attacker Value
Unknown

CVE-2005-0533

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
0
Attacker Value
Unknown

CVE-2004-2430

Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Trend OfficeScan Corporate Edition 5.58 and possibly earler does not drop privileges when opening a help window from a virus detection pop-up window, which allows local users to gain SYSTEM privileges.
0
Attacker Value
Unknown

CVE-2004-2006

Disclosure Date: May 07, 2004 (last updated February 22, 2025)
Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection.
0