Description
Trend Micro ScanMail for Exchange (SMEX) before 3.81 and before 6.1 might install a back door account in smg_Smxcfg30.exe, which allows remote attackers to gain access to the web management interface via the vcc parameter, possibly "3560121183d3".
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Rod Boron · textremotewindows
https://www.exploit-db.com/exploits/22174
References (5)
Core 5
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/7881
Various Sources x_refsource_confirm
http://kb.trendmicro.com/solutions/solutionDetail.asp?solutionId=13352
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/11061
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/6619
Third Party Advisory mailing-list
x_refsource_vulnwatch
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0021.html
Scores
EPSS
0.0296
EPSS Percentile
86.6%
Details
CWE
CWE-287
Status
published
Products (1)
trend_micro/scanmail
< 3.8
Published
Dec 31, 2003
Tracked Since
Feb 18, 2026