Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Integrated_threat_management
(Broadcom)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2007-06-06 | CVE-2007-2864 | Stack-based buffer overflow in the Anti-Virus engine before content update 30.6 in multiple CA (formerly Computer Associates) products allows remote attackers to execute arbitrary code via a large invalid value of the coffFiles field in a .CAB file. | Anti\-Virus_for_the_enterprise, Brightstor_arcserve_backup, Common_services, Etrust_antivirus, Etrust_antivirus_gateway, Etrust_antivirus_sdk, Etrust_ez_antivirus, Etrust_ez_armor, Integrated_threat_management, Internet_security_suite, Unicenter_network_and_systems_management, Etrust_secure_content_manager, Protection_suites | N/A | ||
2007-05-11 | CVE-2007-2523 | CA Anti-Virus for the Enterprise r8 and Threat Manager r8 before 20070510 use weak permissions (NULL security descriptor) for the Task Service shared file mapping, which allows local users to modify this mapping and gain privileges by triggering a stack-based buffer overflow in InoCore.dll before 8.0.448.0. | Integrated_threat_management, Anti\-Virus_for_the_enterprise | N/A | ||
2006-06-27 | CVE-2006-3223 | Format string vulnerability in CA Integrated Threat Management (ITM), eTrust Antivirus (eAV), and eTrust PestPatrol (ePP) r8 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a scan job with format strings in the description field. | Etrust_antivirus, Etrust_pestpatrol, Integrated_threat_management | N/A |