CVE List

Id CVE No. Status Description Phase Votes Comments Actions
3250  CVE-2001-0432  Candidate  Buffer overflows in various CGI programs in the remote administration service for Trend Micro Interscan VirusWall 3.01 allow remote attackers to execute arbitrary commands.  Proposed (20010524)  ACCEPT(1) Ziese | MODIFY(1) Frech | NOOP(2) Cole, Wall  Frech> XF:interscan-viruswall-isadmin-bo(6368)  View
4832  CVE-2002-0440  Candidate  Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients.  Modified (20050707)  MODIFY(1) Frech | NOOP(5) Cole, Cox, Foat, Green, Wall  Frech> XF:interscan-viruswall-http-proxy-bypass(8425)  View
3598  CVE-2001-0791  Candidate  Trend Micro InterScan VirusWall for Windows NT allows remote attackers to make configuration changes by directly calling certain CGI programs, which do not restrict access.  Proposed (20011012)  MODIFY(1) Frech | NOOP(3) Armstrong, Cole, Foat | REVIEWING(1) Wall  Frech> XF:interscan-viruswall-change-configuration(6641)  View
1646  CVE-2000-0068  Candidate  daynad program in Intel InBusiness E-mail Station does not require authentication, which allows remote attackers to modify its configuration, delete files, or read mail.  Proposed (20000125)  MODIFY(1) Frech  Frech> XF:intel-email-unauthenticate-users  View
1348  CVE-1999-1368  Candidate  AV Option for MS Exchange Server option for InoculateIT 4.53, and possibly other versions, only scans the Inbox folder tree of a Microsoft Exchange server, which could allow viruses to escape detection if a user"s rules cause the message to be moved to a different mailbox.  Proposed (20010912)  MODIFY(1) Frech | NOOP(3) Cole, Foat, Wall  Frech> XF:inoculate-message-redirect-bypass(5602)  View

Page 148 of 20943, showing 5 records out of 104715 total, starting on record 736, ending on 740

Actions