Product:

Interscan_viruswall_for_windows_nt

(Trend_micro)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 3
Date Id Summary Products Score Patch Annotated
2007-02-08 CVE-2007-0851 Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable. Client\-Server\-Messaging_suite_smb, Client\-Server_suite_smb, Control_manager, Interscan_emanager, Interscan_messaging_security_suite, Interscan_viruswall, Interscan_viruswall_for_windows_nt, Interscan_viruswall_scan_engine, Interscan_web_security_suite, Interscan_webmanager, Interscan_webprotect, Officescan, Pc\-Cillin, Pc\-Cillin_internet_security, Pc_cillin_\-_internet_security_2006, Portalprotect, Scanmail, Scanmail_emanager, Scanning_engine, Serverprotect, Viruswall, Web_security_suite, Webprotect N/A
2004-03-24 CVE-2004-1859 Directory traversal vulnerability in Trend Micro Interscan Web Viruswall in InterScan VirusWall 3.5x allows remote attackers to read arbitrary files via a .. (dot dot) in the URL. Interscan_viruswall_for_windows_nt N/A
2002-12-31 CVE-2002-1839 Trend Micro InterScan VirusWall for Windows NT 3.52 does not record the sender's IP address in the headers for a mail message when it is passed from VirusWall to the MTA, which allows remote attackers to hide the origin of the message. Interscan_viruswall_for_windows_nt N/A