Home
Bugtraq
Full List
Only Bugs
Only Tricks
Only Exploits
Only Dorks
Only CVE
Only CWE
Fake Notes
Ranking
CVEMAP
Full List
Show Vendors
Show Products
CWE Dictionary
Check CVE Id
Check CWE Id
Search
Bugtraq
CVEMAP
By author
CVE Id
CWE Id
By vendors
By products
RSS
Bugtraq
CVEMAP
CVE Products
Bugs
Exploits
Dorks
More
cIFrex
Facebook
Twitter
Donate
About
Submit
Vulnerabilities for
'Interscan web security suite'
2009-02-17
CVE-2009-0613
CWE-264
Trend Micro InterScan Web Security Suite (IWSS) 3.1 before build 1237 allows remote authenticated Auditor and Report Only users to bypass intended permission settings, and modify the system configuration, via requests to unspecified JSP pages.
CVE-2009-0612
CWE-200
Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 3.x and InterScan Web Security Suite (IWSS) 3.x, when basic authorization is enabled on the standalone proxy, forwards the Proxy-Authorization header from Windows Media Player, which allows remote web servers to obtain credentials by offering a media stream and then capturing this header.
2007-02-08
CVE-2007-0851
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.
2006-02-10
CVE-2006-0642
CWE-Other
Trend Micro ServerProtect 5.58, and possibly InterScan Messaging Security Suite and InterScan Web Security Suite, have a default configuration setting of "Do not scan compressed files when Extracted file count exceeds 500 files," which may be too low in certain circumstances, which allows remote attackers to bypass anti-virus checks by sending compressed archives containing many small files. NOTE: since this is related to a configuration setting that has an operational impact that might vary depending on the environment, and the product is claimed to report a message when the compressed file exceeds specified limits, perhaps this should not be included in CVE.
2005-05-02
CVE-2005-0533
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
>>>
Vendor:
Trend micro
67
Products
Interscan viruswall
Pc-cillin
Officescan
Virus buster 2001
Scanmail exchange
Interscan webmanager
Virus control system
Interscan emanager
Interscan applettrap
Virus buster
Interscan viruswall for windows nt
Damage cleanup server
Housecall
Scanmail
Scanmail domino
Control manager
Client-server-messaging suite smb
Client-server suite smb
Interscan messaging security suite
Interscan web security suite
Interscan webprotect
Portalprotect
Scanmail emanager
Serverprotect
Serverprotect earthagent
Antispyware
Pc-cillin 2005
Pc-cillin 2006
Scan engine
Officescan corporate edition
Pc cillin - internet security 2006
Client-server-messaging security
Viruswall
Interscan viruswall scan engine
Pc-cillin internet security
Scanning engine
Web security suite
Webprotect
Damage cleanup services
Tmcomm.sys
Trend micro antirootkit common module
Trend micro antispyware
Trend micro antivirus
Vsapini.sys
Pc-cillin internet security 2007
Trend micro antivirus plus antispyware
Trend micro internet security virus bust
Trend micro internet security pro
Client server messaging suite
Worry free business security
Internet security 2007
Internet security 2008
Interscan web security virtual appliance
Mobile security
Interscan messaging security virtual appliance
Deep discovery inspector
Password manager
Email encryption gateway
Business security
Business security services
Office scan
Virtual mobile infrastructure
Smart protection server
Endpoint sensor
Deep security
Security
Worry-free business security
Copyright
2024
, cxsecurity.com
Back to Top