Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Interscan_viruswall_for_windows_nt
(Trend_micro)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 3 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2007-02-08 | CVE-2007-0851 | Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable. | Client\-Server\-Messaging_suite_smb, Client\-Server_suite_smb, Control_manager, Interscan_emanager, Interscan_messaging_security_suite, Interscan_viruswall, Interscan_viruswall_for_windows_nt, Interscan_viruswall_scan_engine, Interscan_web_security_suite, Interscan_webmanager, Interscan_webprotect, Officescan, Pc\-Cillin, Pc\-Cillin_internet_security, Pc_cillin_\-_internet_security_2006, Portalprotect, Scanmail, Scanmail_emanager, Scanning_engine, Serverprotect, Viruswall, Web_security_suite, Webprotect | N/A | ||
2004-03-24 | CVE-2004-1859 | Directory traversal vulnerability in Trend Micro Interscan Web Viruswall in InterScan VirusWall 3.5x allows remote attackers to read arbitrary files via a .. (dot dot) in the URL. | Interscan_viruswall_for_windows_nt | N/A | ||
2002-12-31 | CVE-2002-1839 | Trend Micro InterScan VirusWall for Windows NT 3.52 does not record the sender's IP address in the headers for a mail message when it is passed from VirusWall to the MTA, which allows remote attackers to hide the origin of the message. | Interscan_viruswall_for_windows_nt | N/A |