Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Control_manager
(Trend_micro)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 6 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2012-09-28 | CVE-2012-2998 | SQL injection vulnerability in the ad hoc query module in Trend Micro Control Manager (TMCM) before 5.5.0.1823 and 6.0 before 6.0.0.1449 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | Control_manager | N/A | ||
2011-12-25 | CVE-2011-5001 | Stack-based buffer overflow in the CGenericScheduler::AddTask function in cmdHandlerRedAlertController.dll in CmdProcessor.exe in Trend Micro Control Manager 5.5 before Build 1613 allows remote attackers to execute arbitrary code via a crafted IPC packet to TCP port 20101. | Control_manager | N/A | ||
2007-02-08 | CVE-2007-0851 | Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable. | Client\-Server\-Messaging_suite_smb, Client\-Server_suite_smb, Control_manager, Interscan_emanager, Interscan_messaging_security_suite, Interscan_viruswall, Interscan_viruswall_for_windows_nt, Interscan_viruswall_scan_engine, Interscan_web_security_suite, Interscan_webmanager, Interscan_webprotect, Officescan, Pc\-Cillin, Pc\-Cillin_internet_security, Pc_cillin_\-_internet_security_2006, Portalprotect, Scanmail, Scanmail_emanager, Scanning_engine, Serverprotect, Viruswall, Web_security_suite, Webprotect | N/A | ||
2006-06-27 | CVE-2006-3261 | Cross-site scripting (XSS) vulnerability in Trend Micro Control Manager (TMCM) 3.5 allows remote attackers to inject arbitrary web script or HTML via the username field on the login page, which is not properly sanitized before being displayed in the error log. | Control_manager | N/A | ||
2005-05-02 | CVE-2005-0533 | Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure. | Client\-Server\-Messaging_suite_smb, Client\-Server_suite_smb, Control_manager, Interscan_emanager, Interscan_messaging_security_suite, Interscan_viruswall, Interscan_web_security_suite, Interscan_webmanager, Interscan_webprotect, Officescan, Pc\-Cillin, Portalprotect, Scanmail, Scanmail_emanager, Serverprotect | N/A | ||
2005-05-02 | CVE-2005-0383 | Trend Micro Control Manager 3.0 Enterprise Edition allows remote attackers to gain privileges via a replay attack of the encrypted username and password. | Control_manager | N/A |