Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro interscan viruswall vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0428
Buffer overflow in the SMTP gateway for InterScan Virus Wall 3.32 and previous versions allows a remote malicious user to execute arbitrary commands via a long filename for a uuencoded attachment.
Trend Micro Interscan Viruswall 3.32
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Interscan Viruswall 3.2.3
Trend Micro Interscan Viruswall 3.3
NA
CVE-2001-0958
Buffer overflows in eManager plugin for Trend Micro InterScan VirusWall for NT 3.51 and 3.51J allow remote malicious users to execute arbitrary code via long arguments to the CGI programs (1) register.dll, (2) ContentFilter.dll, (3) SFNofitication.dll, (4) register.dll, (5) TOP10...
Trend Micro Interscan Emanager 3.51 J
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Interscan Viruswall 3.2.3
Trend Micro Interscan Viruswall 3.3
Trend Micro Interscan Emanager 3.51
Trend Micro Interscan Viruswall 3.32
NA
CVE-2001-0133
The web administration interface for Interscan VirusWall 3.6.x and previous versions does not use encryption, which could allow remote malicious users to obtain the administrator password to sniff the administrator password via the setpasswd.cgi program or other HTTP GET requests...
Trend Micro Interscan Viruswall
Trend Micro Interscan Viruswall 3.0.1
NA
CVE-2001-0132
Interscan VirusWall 3.6.x and previous versions follows symbolic links when uninstalling the product, which allows local users to overwrite arbitrary files via a symlink attack.
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Interscan Viruswall
NA
CVE-2004-1859
Directory traversal vulnerability in Trend Micro Interscan Web Viruswall in InterScan VirusWall 3.5x allows remote malicious users to read arbitrary files via a .. (dot dot) in the URL.
Trend Micro Interscan Viruswall For Windows Nt 3.4
Trend Micro Interscan Viruswall For Windows Nt 3.52
Trend Micro Interscan Viruswall For Windows Nt 3.52 Build1466
Trend Micro Interscan Viruswall For Windows Nt 3.6
Trend Micro Interscan Viruswall For Windows Nt 3.5
Trend Micro Interscan Viruswall For Windows Nt 3.51
1 EDB exploit
NA
CVE-2002-2394
InterScan VirusWall 3.6 for Linux and 3.52 for Windows allows remote malicious users to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 chunked transfer encoding.
Trend Micro Interscan Viruswall 3.6
Trend Micro Interscan Viruswall 3.52
NA
CVE-2002-0440
Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients.
Trend Micro Interscan Viruswall 3.51
Trend Micro Interscan Viruswall 3.6
1 EDB exploit
NA
CVE-1999-1533
Eicon Technology Diva LAN ISDN modem allows a remote malicious user to cause a denial of service (hang) via a long password argument to the login.htm file in its HTTP service.
Trend Micro Interscan Viruswall 3.2.3
Trend Micro Interscan Viruswall 3.3
1 EDB exploit
NA
CVE-1999-1529
A buffer overflow exists in the HELO command in Trend Micro Interscan VirusWall SMTP gateway 3.23/3.3 for NT, which may allow an malicious user to execute arbitrary code.
Trend Micro Interscan Viruswall 3.3
Trend Micro Interscan Viruswall 3.23
2 EDB exploits
NA
CVE-2001-0679
A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote malicious user to execute arbitrary code by sending a long HELO command to the server.
Trend Micro Interscan Viruswall 3.23
Trend Micro Interscan Viruswall 3.3
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »