Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2007-0851

Disclosure Date: February 08, 2007 (last updated October 04, 2023)
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.
0
Attacker Value
Unknown

CVE-2005-0533

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
0
Attacker Value
Unknown

CVE-2004-1859

Disclosure Date: March 24, 2004 (last updated February 22, 2025)
Directory traversal vulnerability in Trend Micro Interscan Web Viruswall in InterScan VirusWall 3.5x allows remote attackers to read arbitrary files via a .. (dot dot) in the URL.
0
Attacker Value
Unknown

CVE-2002-2394

Disclosure Date: December 31, 2002 (last updated February 22, 2025)
InterScan VirusWall 3.6 for Linux and 3.52 for Windows allows remote attackers to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 chunked transfer encoding.
0
Attacker Value
Unknown

CVE-2002-0440

Disclosure Date: July 26, 2002 (last updated February 22, 2025)
Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients.
0