NVD List
| Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
|---|---|---|---|---|---|---|---|---|---|
| 72383 | CVE-2004-2006 | Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection. | 2 | 4.6 | Medium | 2017-07-18 | 2017-07-10 | View | |
| 60090 | CVE-2006-1381 | Trend Micro OfficeScan 5.5, and probably other versions before 6.5, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying tmlisten.exe. | 2 | 10 | High | 2016-12-20 | 2011-03-07 | View | |
| 63818 | CVE-2006-5212 | Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 before 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 before 6.5.0.1418, 7.0 before 7.0.0.1257, and 7.3 before 7.3.0.1053 allow remote attackers to delete files via a modified filename parameter in a certain HTTP request that invokes the OfficeScan CGI program. | 2 | 5 | Medium | 2016-12-20 | 2011-03-07 | View | |
| 63817 | CVE-2006-5211 | Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 before 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 before 6.5.0.1418, 7.0 before 7.0.0.1257, and 7.3 before 7.3.0.1053 allow remote attackers to remove OfficeScan clients via a certain HTTP request that invokes the OfficeScan CGI program. | 2 | 6.4 | Medium | 2016-12-20 | 2011-03-07 | View | |
| 76448 | CVE-2000-0205 | Trend Micro OfficeScan allows remote attackers to replay administrative commands and modify the configuration of OfficeScan clients. | 2 | 6.4 | Medium | 2017-01-05 | 2008-09-10 | View |
Page 15207 of 17672, showing 5 records out of 88360 total, starting on record 76031, ending on 76035