Lucene search

K
Trend MicroInterscan Viruswall3.52

5 matches found

CVE
CVE
added 2007/11/01 5:0 p.m.42 views

CVE-2002-2394

InterScan VirusWall 3.6 for Linux and 3.52 for Windows allows remote attackers to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 chunked transfer encoding.

5CVSS8.2AI score0.00595EPSS
CVE
CVE
added 2007/11/01 5:0 p.m.38 views

CVE-2002-2395

InterScan VirusWall 3.52 for Windows allows remote attackers to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 gzip content encoding.

5CVSS8.2AI score0.00531EPSS
CVE
CVE
added 2002/07/11 4:0 a.m.32 views

CVE-2002-0637

InterScan VirusWall 3.52 build 1462 allows remote attackers to bypass virus protection via e-mail messages with headers that violate RFC specifications by having (or missing) space characters in unexpected places (aka "space gap"), such as (1) Content-Type :", (2) "Content-Transfer-Encoding :", (3)...

7.5CVSS7.1AI score0.03825EPSS
CVE
CVE
added 2005/05/02 4:0 a.m.31 views

CVE-2005-0533

Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.

7.5CVSS7.9AI score0.06973EPSS
CVE
CVE
added 2002/09/24 4:0 a.m.29 views

CVE-2002-1121

SMTP content filter engines, including (1) GFI MailSecurity for Exchange/SMTP before 7.2, (2) InterScan VirusWall before 3.52 build 1494, (3) the default configuration of MIMEDefang before 2.21, and possibly other products, do not detect fragmented emails as defined in RFC2046 ("Message Fragmentati...

7.5CVSS6.9AI score0.02198EPSS