Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro interscan viruswall 3.51 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2001-1573
Buffer overflow in smtpscan.dll for Trend Micro InterScan VirusWall 3.51 for Windows NT has allows remote malicious users to execute arbitrary code via a certain configuration parameter.
Trend Micro Interscan Viruswall 3.51
9.3
CVSSv2
CVE-2007-0851
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote malicious users to execute arbitrary code via a malformed UPX compressed executable.
Trend Micro Interscan Emanager 3.5.2
Trend Micro Scanmail 3.81
Trend Micro Pc Cillin - Internet Security 2006
Trend Micro Interscan Viruswall 3.7.0
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 3.11
Trend Micro Interscan Viruswall For Windows Nt 3.6
Trend Micro Officescan Corporate 3.0
Trend Micro Interscan Viruswall 3.2.3
Trend Micro Interscan Viruswall 3.81
Trend Micro Portalprotect 1.2
Trend Micro Interscan Viruswall Gold
Trend Micro Officescan Corporate 7.0
Trend Micro Scanmail Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Serverprotect 5.5.8
Trend Micro Control Manager 2.5.0
Trend Micro Interscan Viruswall 3.7.0 Build1190
Trend Micro Interscan Emanager 3.6
Trend Micro Officescan Corporate 3.13
Trend Micro Interscan Viruswall 3.8.0 Build1130
7.5
CVSSv2
CVE-2005-0533
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI prior to 7.510, as used in multiple Trend Micro products, allows remote malicious users to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Trend Micro Interscan Emanager 3.5.2
Trend Micro Scanmail 3.81
Trend Micro Serverprotect 2.5
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.0
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Interscan Viruswall 3.52
Trend Micro Interscan Viruswall 3.5
Trend Micro Interscan Viruswall 3.4
Trend Micro Serverprotect 1.3
Trend Micro Interscan Viruswall Gold
Trend Micro Scanmail Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Interscan Viruswall 3.52 Build1466
Trend Micro Interscan Emanager 3.6
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 5.02
Trend Micro Scanmail 2.51
Trend Micro Scanmail 6.1
Trend Micro Interscan Webmanager 1.2
7.5
CVSSv2
CVE-2002-1121
SMTP content filter engines, including (1) GFI MailSecurity for Exchange/SMTP prior to 7.2, (2) InterScan VirusWall prior to 3.52 build 1494, (3) the default configuration of MIMEDefang prior to 2.21, and possibly other products, do not detect fragmented emails as defined in RFC2...
Gfi Mailsecurity 7.2
Trend Micro Interscan Viruswall 3.51
Roaring Penguin Mimedefang 2.14
Network Associates Webshield Smtp 4.0.5
Trend Micro Interscan Viruswall 3.5
Roaring Penguin Canit 1.2
Network Associates Webshield Smtp 4.5.44
Roaring Penguin Mimedefang 2.20
Network Associates Webshield Smtp 4.5.74.0
Trend Micro Interscan Viruswall 3.52
Network Associates Webshield Smtp 4.5
7.5
CVSSv2
CVE-2002-0440
Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients.
Trend Micro Interscan Viruswall 3.51
Trend Micro Interscan Viruswall 3.6
1 EDB exploit
7.5
CVSSv2
CVE-2001-0958
Buffer overflows in eManager plugin for Trend Micro InterScan VirusWall for NT 3.51 and 3.51J allow remote malicious users to execute arbitrary code via long arguments to the CGI programs (1) register.dll, (2) ContentFilter.dll, (3) SFNofitication.dll, (4) register.dll, (5) TOP10...
Trend Micro Interscan Viruswall 3.2.3
Trend Micro Interscan Viruswall 3.3
Trend Micro Interscan Emanager 3.51 J
Trend Micro Interscan Emanager 3.51
Trend Micro Interscan Viruswall 3.32
Trend Micro Interscan Viruswall 3.0.1
5
CVSSv2
CVE-2004-1859
Directory traversal vulnerability in Trend Micro Interscan Web Viruswall in InterScan VirusWall 3.5x allows remote malicious users to read arbitrary files via a .. (dot dot) in the URL.
Trend Micro Interscan Viruswall For Windows Nt 3.6
Trend Micro Interscan Viruswall For Windows Nt 3.5
Trend Micro Interscan Viruswall For Windows Nt 3.52
Trend Micro Interscan Viruswall For Windows Nt 3.52 Build1466
Trend Micro Interscan Viruswall For Windows Nt 3.4
Trend Micro Interscan Viruswall For Windows Nt 3.51
1 EDB exploit
5
CVSSv2
CVE-2001-0791
Trend Micro InterScan VirusWall for Windows NT allows remote malicious users to make configuration changes by directly calling certain CGI programs, which do not restrict access.
Trend Micro Interscan Viruswall
1 EDB exploit
4.6
CVSSv2
CVE-2001-0678
A buffer overflow in reggo.dll file used by Trend Micro InterScan VirusWall before 3.51 build 1349 for Windows NT 3.5 and InterScan WebManager 1.2 allows a local malicious user to execute arbitrary code.
Trend Micro Interscan Viruswall 3.51
Trend Micro Interscan Webmanager 1.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
malicious code
XML injection
CVE-2024-28020
CVE-2024-35252
CVE-2024-5833
CVE-2024-30066
injection
CVE-2024-23282
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started