Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Viruswall
(Trend_micro)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2007-02-08 | CVE-2007-0851 | Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable. | Client\-Server\-Messaging_suite_smb, Client\-Server_suite_smb, Control_manager, Interscan_emanager, Interscan_messaging_security_suite, Interscan_viruswall, Interscan_viruswall_for_windows_nt, Interscan_viruswall_scan_engine, Interscan_web_security_suite, Interscan_webmanager, Interscan_webprotect, Officescan, Pc\-Cillin, Pc\-Cillin_internet_security, Pc_cillin_\-_internet_security_2006, Portalprotect, Scanmail, Scanmail_emanager, Scanning_engine, Serverprotect, Viruswall, Web_security_suite, Webprotect | N/A | ||
2007-01-30 | CVE-2007-0602 | Buffer overflow in libvsapi.so in the VSAPI library in Trend Micro VirusWall 3.81 for Linux, as used by IScan.BASE/vscan, allows local users to gain privileges via a long command line argument, a different vulnerability than CVE-2005-0533. | Viruswall | N/A |