Lucene search

K
Trend MicroInterscan Viruswall3.51

5 matches found

CVE
CVE
added 2005/08/05 4:0 a.m.37 views

CVE-2001-1573

Buffer overflow in smtpscan.dll for Trend Micro InterScan VirusWall 3.51 for Windows NT has allows remote attackers to execute arbitrary code via a certain configuration parameter.

10CVSS8.3AI score0.01946EPSS
CVE
CVE
added 2001/09/20 4:0 a.m.33 views

CVE-2001-0678

A buffer overflow in reggo.dll file used by Trend Micro InterScan VirusWall prior to 3.51 build 1349 for Windows NT 3.5 and InterScan WebManager 1.2 allows a local attacker to execute arbitrary code.

4.6CVSS7.9AI score0.00101EPSS
CVE
CVE
added 2005/05/02 4:0 a.m.31 views

CVE-2005-0533

Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.

7.5CVSS7.9AI score0.06973EPSS
CVE
CVE
added 2002/09/24 4:0 a.m.29 views

CVE-2002-1121

SMTP content filter engines, including (1) GFI MailSecurity for Exchange/SMTP before 7.2, (2) InterScan VirusWall before 3.52 build 1494, (3) the default configuration of MIMEDefang before 2.21, and possibly other products, do not detect fragmented emails as defined in RFC2046 ("Message Fragmentati...

7.5CVSS6.9AI score0.02198EPSS
CVE
CVE
added 2002/07/26 4:0 a.m.27 views

CVE-2002-0440

Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients.

7.5CVSS6.9AI score0.04079EPSS