NVD List
| Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
|---|---|---|---|---|---|---|---|---|---|
| 5294 | CVE-2008-5545 | Trend Micro VSAPI 8.700.0.1004 in Trend Micro AntiVirus, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. | 2 | 9.3 | High | 2017-01-03 | 2009-01-29 | View | |
| 72807 | CVE-2004-2430 | Trend OfficeScan Corporate Edition 5.58 and possibly earler does not drop privileges when opening a help window from a virus detection pop-up window, which allows local users to gain SYSTEM privileges. | 2 | 7.2 | High | 2017-07-18 | 2017-07-10 | View | |
| 71404 | CVE-2004-1003 | Trend ScanMail allows remote attackers to obtain potentially sensitive information or disable the anti-virus capability via the smency.nsf file. | 2 | 5 | Medium | 2017-07-18 | 2017-07-10 | View | |
| 4924 | CVE-2008-5140 | trend-autoupdate.new in mailscanner 4.55.10 and other versions before 4.74.16-1 allows local users to overwrite arbitrary files via a symlink attack on a (1) /tmp/opr.ini.##### or (2) /tmp/lpt*.zip temporary file. | 2 | 6.9 | Medium | 2017-01-03 | 2012-10-30 | View | |
| 78051 | CVE-2001-0586 | TrendMicro ScanMail for Exchange 3.5 Evaluation allows a local attacker to recover the administrative credentials for ScanMail via a combination of unprotected registry keys and weakly encrypted passwords. | 2 | 4.6 | Medium | 2017-01-05 | 2008-09-05 | View |
Page 15211 of 17672, showing 5 records out of 88360 total, starting on record 76051, ending on 76055