Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro interscan viruswall vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2001-1573
Buffer overflow in smtpscan.dll for Trend Micro InterScan VirusWall 3.51 for Windows NT has allows remote malicious users to execute arbitrary code via a certain configuration parameter.
Trend Micro Interscan Viruswall 3.51
10
CVSSv2
CVE-2001-1574
Buffer overflow in (1) HttpSaveCVP.dll and (2) HttpSaveCSP.dll in Trend Micro InterScan VirusWall 3.5.1 allows remote malicious users to execute arbitrary code.
Trend Micro Interscan Viruswall 3.5.1
10
CVSSv2
CVE-2001-0432
Buffer overflows in various CGI programs in the remote administration service for Trend Micro Interscan VirusWall 3.01 allow remote malicious users to execute arbitrary commands.
Trend Micro Interscan Viruswall 3.0.1
1 EDB exploit
10
CVSSv2
CVE-2001-0133
The web administration interface for Interscan VirusWall 3.6.x and previous versions does not use encryption, which could allow remote malicious users to obtain the administrator password to sniff the administrator password via the setpasswd.cgi program or other HTTP GET requests...
Trend Micro Interscan Viruswall
Trend Micro Interscan Viruswall 3.0.1
10
CVSSv2
CVE-2000-0428
Buffer overflow in the SMTP gateway for InterScan Virus Wall 3.32 and previous versions allows a remote malicious user to execute arbitrary commands via a long filename for a uuencoded attachment.
Trend Micro Interscan Viruswall 3.32
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Interscan Viruswall 3.2.3
Trend Micro Interscan Viruswall 3.3
10
CVSSv2
CVE-2001-0679
A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote malicious user to execute arbitrary code by sending a long HELO command to the server.
Trend Micro Interscan Viruswall 3.23
Trend Micro Interscan Viruswall 3.3
2 EDB exploits
9.3
CVSSv2
CVE-2007-0851
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote malicious users to execute arbitrary code via a malformed UPX compressed executable.
Trend Micro Control Manager Gold
Trend Micro Interscan Emanager 3.51 J
Trend Micro Interscan Emanager 3.6
Trend Micro Interscan Messaging Security Suite Gold
Trend Micro Interscan Viruswall 3.6
Trend Micro Interscan Viruswall 3.6.0 Build 1182
Trend Micro Interscan Viruswall 3.6.0 Build1166
Trend Micro Interscan Viruswall 3.8.0 Build1130
Trend Micro Interscan Viruswall 3.81
Trend Micro Interscan Viruswall For Windows Nt 3.4
Trend Micro Interscan Viruswall For Windows Nt 3.5
Trend Micro Interscan Web Security Suite
Trend Micro Interscan Web Security Suite Gold
Trend Micro Officescan 3.0
Trend Micro Officescan 4.5.0
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 3.5
Trend Micro Control Manager 2.5.0
Trend Micro Control Manager 3.5
Trend Micro Interscan Emanager 3.5
Trend Micro Interscan Emanager 3.51
Trend Micro Interscan Messaging Security Suite 5.5 Build 1183
7.5
CVSSv2
CVE-2005-0533
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI prior to 7.510, as used in multiple Trend Micro products, allows remote malicious users to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Trend Micro Control Manager Gold
Trend Micro Interscan Emanager 3.5.2
Trend Micro Interscan Emanager 3.6
Trend Micro Interscan Messaging Security Suite 5.5
Trend Micro Interscan Viruswall 3.5
Trend Micro Interscan Viruswall 3.52
Trend Micro Interscan Viruswall 5.1
Trend Micro Interscan Viruswall Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Interscan Webmanager 1.2
Trend Micro Interscan Webmanager 2.1
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 5.58
Trend Micro Pc-cillin 2000
Trend Micro Scanmail 2.51
Trend Micro Scanmail 3.8
Trend Micro Scanmail 6.1
Trend Micro Scanmail Gold
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Client-server Suite Smb Gold
Trend Micro Interscan Messaging Security Suite Gold
7.5
CVSSv2
CVE-2002-1121
SMTP content filter engines, including (1) GFI MailSecurity for Exchange/SMTP prior to 7.2, (2) InterScan VirusWall prior to 3.52 build 1494, (3) the default configuration of MIMEDefang prior to 2.21, and possibly other products, do not detect fragmented emails as defined in RFC2...
Roaring Penguin Mimedefang 2.14
Roaring Penguin Mimedefang 2.20
Network Associates Webshield Smtp 4.5
Network Associates Webshield Smtp 4.5.44
Trend Micro Interscan Viruswall 3.52
Gfi Mailsecurity 7.2
Network Associates Webshield Smtp 4.0.5
Trend Micro Interscan Viruswall 3.5
Trend Micro Interscan Viruswall 3.51
Network Associates Webshield Smtp 4.5.74.0
Roaring Penguin Canit 1.2
7.5
CVSSv2
CVE-2002-0440
Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients.
Trend Micro Interscan Viruswall 3.51
Trend Micro Interscan Viruswall 3.6
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »