cve-2007-0851
Vulnerability from cvelistv5
Published
2007-02-08 18:00
Modified
2024-08-07 12:34
Severity ?
Summary
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.
References
cve@mitre.orghttp://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034289Patch, Vendor Advisory
cve@mitre.orghttp://jvn.jp/jp/JVN%2377366274/index.html
cve@mitre.orghttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=470Patch, Vendor Advisory
cve@mitre.orghttp://osvdb.org/33038
cve@mitre.orghttp://secunia.com/advisories/24087Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/24128
cve@mitre.orghttp://securitytracker.com/id?1017601Patch, Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1017602
cve@mitre.orghttp://securitytracker.com/id?1017603
cve@mitre.orghttp://www.jpcert.or.jp/at/2007/at070004.txt
cve@mitre.orghttp://www.kb.cert.org/vuls/id/276432US Government Resource
cve@mitre.orghttp://www.securityfocus.com/bid/22449Patch, Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/0522
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/0569
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/32352
af854a3a-2127-422b-91ae-364da2661108http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034289Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://jvn.jp/jp/JVN%2377366274/index.html
af854a3a-2127-422b-91ae-364da2661108http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=470Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/33038
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24087Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24128
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017601Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017602
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017603
af854a3a-2127-422b-91ae-364da2661108http://www.jpcert.or.jp/at/2007/at070004.txt
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/276432US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/22449Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0522
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0569
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/32352
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T12:34:21.122Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1017601",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1017601",
               },
               {
                  name: "22449",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/22449",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034289",
               },
               {
                  name: "1017603",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1017603",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.jpcert.or.jp/at/2007/at070004.txt",
               },
               {
                  name: "24087",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24087",
               },
               {
                  name: "33038",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/33038",
               },
               {
                  name: "ADV-2007-0522",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/0522",
               },
               {
                  name: "JVN#77366274",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_JVN",
                     "x_transferred",
                  ],
                  url: "http://jvn.jp/jp/JVN%2377366274/index.html",
               },
               {
                  name: "VU#276432",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/276432",
               },
               {
                  name: "20070208 Trend Micro AntiVirus UPX Parsing Kernel Buffer Overflow Vulnerability",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_IDEFENSE",
                     "x_transferred",
                  ],
                  url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=470",
               },
               {
                  name: "antivirus-upx-bo(32352)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/32352",
               },
               {
                  name: "ADV-2007-0569",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/0569",
               },
               {
                  name: "1017602",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1017602",
               },
               {
                  name: "24128",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/24128",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-02-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-28T12:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1017601",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1017601",
            },
            {
               name: "22449",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/22449",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034289",
            },
            {
               name: "1017603",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1017603",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.jpcert.or.jp/at/2007/at070004.txt",
            },
            {
               name: "24087",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24087",
            },
            {
               name: "33038",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/33038",
            },
            {
               name: "ADV-2007-0522",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/0522",
            },
            {
               name: "JVN#77366274",
               tags: [
                  "third-party-advisory",
                  "x_refsource_JVN",
               ],
               url: "http://jvn.jp/jp/JVN%2377366274/index.html",
            },
            {
               name: "VU#276432",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/276432",
            },
            {
               name: "20070208 Trend Micro AntiVirus UPX Parsing Kernel Buffer Overflow Vulnerability",
               tags: [
                  "third-party-advisory",
                  "x_refsource_IDEFENSE",
               ],
               url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=470",
            },
            {
               name: "antivirus-upx-bo(32352)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/32352",
            },
            {
               name: "ADV-2007-0569",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/0569",
            },
            {
               name: "1017602",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1017602",
            },
            {
               name: "24128",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/24128",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2007-0851",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1017601",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1017601",
                  },
                  {
                     name: "22449",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/22449",
                  },
                  {
                     name: "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034289",
                     refsource: "CONFIRM",
                     url: "http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034289",
                  },
                  {
                     name: "1017603",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1017603",
                  },
                  {
                     name: "http://www.jpcert.or.jp/at/2007/at070004.txt",
                     refsource: "MISC",
                     url: "http://www.jpcert.or.jp/at/2007/at070004.txt",
                  },
                  {
                     name: "24087",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24087",
                  },
                  {
                     name: "33038",
                     refsource: "OSVDB",
                     url: "http://osvdb.org/33038",
                  },
                  {
                     name: "ADV-2007-0522",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/0522",
                  },
                  {
                     name: "JVN#77366274",
                     refsource: "JVN",
                     url: "http://jvn.jp/jp/JVN%2377366274/index.html",
                  },
                  {
                     name: "VU#276432",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/276432",
                  },
                  {
                     name: "20070208 Trend Micro AntiVirus UPX Parsing Kernel Buffer Overflow Vulnerability",
                     refsource: "IDEFENSE",
                     url: "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=470",
                  },
                  {
                     name: "antivirus-upx-bo(32352)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/32352",
                  },
                  {
                     name: "ADV-2007-0569",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/0569",
                  },
                  {
                     name: "1017602",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1017602",
                  },
                  {
                     name: "24128",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/24128",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2007-0851",
      datePublished: "2007-02-08T18:00:00",
      dateReserved: "2007-02-08T00:00:00",
      dateUpdated: "2024-08-07T12:34:21.122Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2007-0851\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-02-08T18:28:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de búfer en Trend Micro Scan Engine versiones 8.000 y 8.300 anteriores al archivo de patrones de virus versión 4.245.00, tal y como es usado en otros productos como Cyber Clean Center (CCC) Cleaner, permite a atacantes remotos ejecutar código arbitrario por medio de un ejecutable comprimido UPX malformado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:client-server-messaging_suite_smb:gold:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"8C9AAAD5-E973-41CB-B7FD-85D1EA04F6D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:client-server_suite_smb:gold:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"664CD81D-30AD-450B-A9FF-7C0FC61C938A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:control_manager:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"068639F9-89E0-4B19-9E24-550087080419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:control_manager:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4801FB64-FFC4-4167-9855-69EB8A424EE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:control_manager:gold:*:as_400:*:*:*:*:*\",\"matchCriteriaId\":\"CEEC709C-CE2F-435D-8595-3B7462F5D58A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:control_manager:gold:*:s_390:*:*:*:*:*\",\"matchCriteriaId\":\"416653F7-D8D5-4947-A097-8E1298DD0FEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:control_manager:gold:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"0416D605-20FC-4C87-8009-C240530A1B13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:control_manager:gold:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"4FFD939A-C783-4A02-9859-B823A57F8A5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:control_manager:gold:*:windows_nt:*:*:*:*:*\",\"matchCriteriaId\":\"723E2C95-124F-422F-A241-AECA1D5E0D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:control_manager:netware:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A63C770-365B-4EAF-AF4B-1B379F943DF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_emanager:3.5:*:hp:*:*:*:*:*\",\"matchCriteriaId\":\"9D2CAA96-4C71-482B-A033-E4AD0814C638\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_emanager:3.5.2:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"0DEAD496-BB59-464D-9BBA-29158CF65C35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_emanager:3.6:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"8767F042-4333-404A-B7D7-6830B6959890\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_emanager:3.6:*:sun:*:*:*:*:*\",\"matchCriteriaId\":\"C02396DD-CFBF-4019-8AC7-9C41821AF8E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_emanager:3.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DF73278-A5E9-4975-9C0B-DD9413A33FA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_emanager:3.51_j:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7F86817-D352-452E-B80F-1402C8A76372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_messaging_security_suite:*:*:linux_5.1.1:*:*:*:*:*\",\"matchCriteriaId\":\"0D03DBA4-3F2D-433A-8D17-01B4D7E16EE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_messaging_security_suite:3.81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4086086F-4F57-4E73-B473-FFF33CD23F6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_messaging_security_suite:5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F1E2358-2868-4D95-A783-0D7A591A691C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_messaging_security_suite:5.5_build_1183:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4587F87-E033-4636-9B61-18D1A7AA54D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"7E8ADD8C-2E58-4671-BECF-B02A5DE04A1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"4CD5D110-5FA3-4F6C-A727-06A73676EC9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"CD824873-B625-4755-ADC9-C6657CD63208\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"E4B9603D-79FE-4E7C-A9F9-E9A24FBBDF3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:*:unix:*:*:*:*:*\",\"matchCriteriaId\":\"475CED59-77F7-4E6B-8DB6-EFFC7F8D5929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.1.0:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"29DA2B3D-D055-4328-8AD3-B5B407B17328\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D948171A-3B54-462A-8B2E-2C0266A37E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A9D4E2E-889B-4233-8887-9CF00A5023A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F35126E8-F926-4C0B-B37F-AFE78DD2526F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:hp_ux:*:*:*:*:*\",\"matchCriteriaId\":\"106EB780-7455-41F7-ADB0-67C541F6C53F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"A9EB55C4-00FB-4D2F-993D-27269F09CF08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:windows_nt:*:*:*:*:*\",\"matchCriteriaId\":\"D9AE5039-8467-48C2-8417-E7B18A48F0D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.6.0_build_1182:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA820000-7608-4E3B-A05D-0C3CFC35227C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.6.0_build1166:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20349641-1EAD-4401-996F-15C131574F0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.6.5:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"82425C25-4464-4C69-A7C9-6B7369661E3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AA147F1-224C-4230-9831-5EB153748793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.7.0_build1190:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2417050-7F5A-4702-A6F5-DFEFE96CCD78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.8.0_build1130:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B9F63FB-7B5F-49AF-BC84-B3250A08720A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F72A6DE-BA1B-4907-B19D-D71B172BB249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:3.81:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"37ECAEF4-8A0D-4B90-8E4A-62BA72DAA702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:5.1:*:windows_nt:*:*:*:*:*\",\"matchCriteriaId\":\"25D7EFC1-4053-46E9-9081-3BBAB0300C1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:aix:*:*:*:*:*\",\"matchCriteriaId\":\"8B678239-DD77-488C-82FE-27D6FC47B94A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:linux_for_smb:*:*:*:*:*\",\"matchCriteriaId\":\"071EDC78-C902-4D79-8CDF-F5DD30BF7027\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:smb:*:*:*:*:*\",\"matchCriteriaId\":\"55C6BD67-FE95-43A7-91F7-608DEC79C24A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"29EDFC0F-687B-4B56-8910-67C6E3907483\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:windows_nt_for_smb:*:*:*:*:*\",\"matchCriteriaId\":\"5A694256-BD24-4EED-9833-B15DCA874F15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall_for_windows_nt:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F81C82F-4997-4D4E-981B-F1601A8AD281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall_for_windows_nt:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED3120FB-140A-458B-8926-7FE3593331FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall_for_windows_nt:3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9239FE6-7FE3-4013-8E73-DE648F24EFEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall_for_windows_nt:3.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12023885-3D72-4CE4-B60F-F91EEE0C9153\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall_for_windows_nt:3.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B132F48-3C0D-4DC9-9255-BB2D1CEBF855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall_for_windows_nt:3.52_build1466:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"772DC29B-9C2C-4446-9352-6707E6B6F08F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall_for_windows_nt:5.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3079D9E-853D-46D3-92E8-E125CC800DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_viruswall_scan_engine:7.510.0-1002:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5ADC38A-3C58-42B3-9396-0D7B14EA0B59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_web_security_suite:*:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"1DC6D16A-3D1C-4AA6-B039-BFF5BEE64693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_web_security_suite:*:*:linux_1.0.0_ja:*:*:*:*:*\",\"matchCriteriaId\":\"110A575E-761B-4DD7-B4BE-B9AD22C85213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:*:linux:*:*:*:*:*\",\"matchCriteriaId\":\"1DCB7541-8145-47CA-9F4E-4A600CA454EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:*:solaris:*:*:*:*:*\",\"matchCriteriaId\":\"DB8B2F17-7C2B-4782-9492-D967A2AD8B3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"D1E65854-8869-41F7-BAFE-B7545FC98BAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_webmanager:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1C33920-9BC7-41BC-BB66-723D0BAF2839\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_webmanager:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A73B43D9-A721-4D48-A2D6-48A77355965F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_webmanager:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F3645D-2B7D-44ED-83DE-ABF9016CD0D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:interscan_webprotect:gold:*:isa:*:*:*:*:*\",\"matchCriteriaId\":\"921B617D-F37E-4D10-A627-09F9678790B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:3.0:*:corporate:*:*:*:*:*\",\"matchCriteriaId\":\"4013BF7E-DE8F-4941-BF15-D17C8C88DB78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:4.5.0:*:microsof_sbs:*:*:*:*:*\",\"matchCriteriaId\":\"11302ED5-C1AB-40D0-B019-A85C43E362D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38BD1ADE-408F-45D0-BD0B-FBC83ED976F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_3.0:*:windows_nt_server:*:*:*:*:*\",\"matchCriteriaId\":\"093EED07-F4C1-47B2-9D08-3DE0D57D5CA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_3.1.1:*:windows_nt_server:*:*:*:*:*\",\"matchCriteriaId\":\"CBA9F2BA-1274-465C-B723-ABB54CA17FE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE60F5D9-35D0-4D0E-85D1-EE71E533622F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_3.5:*:windows_nt_server:*:*:*:*:*\",\"matchCriteriaId\":\"6F37307A-7847-4D5A-99D8-8A4BE424CD21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF74A292-2B1B-43FC-AA82-CFB04D7644E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_3.11:*:windows_nt_server:*:*:*:*:*\",\"matchCriteriaId\":\"925DA405-9719-452C-8369-D4A60CC916C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46575AE8-8718-44D8-AF5C-14F7981B3238\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_3.13:*:windows_nt_server:*:*:*:*:*\",\"matchCriteriaId\":\"F893D171-7AB3-4422-BA86-021B0211EE36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_3.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A79FBAAA-D6B8-4A05-B8E1-D7549207EA5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_5.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6CE3BB4-54BA-48DE-9CFC-C2241D99DA67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6F25D89-826B-4FA0-AA8F-CD729F00F9BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_5.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEE87037-D7CC-480B-BBD2-F1802294D4F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB43A95-60F8-425A-8434-C07EC799DC68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"567D7B70-7FE7-4C4F-8D09-C72E28F04FF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:officescan:corporate_7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78CDE85D-4C4B-42D0-BF64-11E880168A83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:pc-cillin:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABBAA86F-8DE4-4BC8-B295-89CF981C28D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:pc-cillin:2000:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9994E64C-0E8C-4A9C-A321-6A73A16E33AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:pc-cillin:2002:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A65282E0-2332-4CAA-9BA9-3794C2CDE960\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:pc-cillin:2003:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E56D571B-649D-41E2-A502-6C1EBAB73F62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:pc-cillin:2005:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E455A061-A34B-4AB7-88C7-222DB08BED08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:pc-cillin:2006:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EB1055E-31AA-44DE-A74C-8678A0C268C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:pc-cillin_internet_security:14_14.00.1485:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"408D7C07-D6CF-4722-AB74-70DE7C114FC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:pc-cillin_internet_security:2005_12.0.0_0_build_1244:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26DA917A-B842-40E7-B3A1-8546ADBB401C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:pc-cillin_internet_security:2006_14.10.0.1023:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C3D9AE-690A-4ACE-B6A2-E83F1B7C5507\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:pc-cillin_internet_security:2007:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F945B425-D79F-4B5F-A588-5DCDCFB87B06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:pc_cillin_-_internet_security_2006:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D237983-725B-43B5-B733-D25397A846C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:portalprotect:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C991F564-93D1-4E63-8B71-B0C9CD9BECA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:portalprotect:1.2:*:sharepoint:*:*:*:*:*\",\"matchCriteriaId\":\"1F34805C-1602-45F7-8C03-D585D2F44594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:scanmail:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71DAD29C-23D7-45C0-8B1B-AD9CD260EAE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:scanmail:2.6:*:domino:*:*:*:*:*\",\"matchCriteriaId\":\"195D657C-4A4B-4832-B1A6-056FB990401E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:scanmail:2.51:*:domino:*:*:*:*:*\",\"matchCriteriaId\":\"929BCF43-AC3A-43D0-8819-7673996D216D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:scanmail:3.8:*:microsoft_exchange:*:*:*:*:*\",\"matchCriteriaId\":\"3BFF861D-F544-4902-A958-BE566FB85738\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:scanmail:3.81:*:microsoft_exchange:*:*:*:*:*\",\"matchCriteriaId\":\"3B282BE2-8116-48A7-B6D6-544983FF72C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:scanmail:6.1:*:microsoft_exchange:*:*:*:*:*\",\"matchCriteriaId\":\"C81AFD13-0883-48F5-BD6B-707CFFE07262\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_aix:*:*:*:*:*\",\"matchCriteriaId\":\"B4963C96-FA13-4E54-8EE3-8E169CACBF4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_as_400:*:*:*:*:*\",\"matchCriteriaId\":\"C3E0300A-27F7-47C1-B725-55FF0BE92FF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_s_390:*:*:*:*:*\",\"matchCriteriaId\":\"FF365F03-F95C-4047-BBA4-42EBD02E823B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_solaris:*:*:*:*:*\",\"matchCriteriaId\":\"A2042D38-CF77-4149-9289-B3380F59D794\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_windows:*:*:*:*:*\",\"matchCriteriaId\":\"D275C0DB-E942-4EB9-B6AA-3112C1A697DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:scanmail_emanager:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4CE79B6-B9E8-4775-B7BF-90C2758EECE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:scanning_engine:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DB5BDA1-06D4-49B9-99CD-F8B67A5EB895\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:serverprotect:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38695C1D-DC51-45EB-9EEB-6E04490AFE6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:serverprotect:5.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A7ACC41-E475-4770-B446-4B41EE008A26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:serverprotect:5.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE7E0AA8-220E-4E20-9FF0-95C22664AFA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:serverprotect:5.58:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"5E2F6774-B29F-47E6-8E50-8CF4D9AB3EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:serverprotect:linux:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EB7A187-75F5-41B5-A6A9-2C28AC5F0F98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:serverprotect:linux_1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42A4608B-A7E7-4217-8F88-C12E9DEC9C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:serverprotect:novell_netware:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C1B8E24-4A28-4110-8DF4-72A5D19FAEAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:serverprotect:windows:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B0BE038-C7F1-45FE-BE54-3D4245B3F060\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:viruswall:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ABCB699-614A-45A5-B906-7650BB32EA29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:web_security_suite:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96D764CC-3574-4D95-8EA2-2C02F36EF133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:trend_micro:webprotect:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F178A5-CEAF-407F-BDE1-2328A4B959A4\"}]}]}],\"references\":[{\"url\":\"http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034289\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://jvn.jp/jp/JVN%2377366274/index.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=470\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/33038\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/24087\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24128\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1017601\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1017602\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1017603\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.jpcert.or.jp/at/2007/at070004.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/276432\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/22449\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/0522\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0569\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/32352\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034289\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://jvn.jp/jp/JVN%2377366274/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=470\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/33038\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24087\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/24128\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1017601\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1017602\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1017603\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.jpcert.or.jp/at/2007/at070004.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/276432\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/22449\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/0522\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/0569\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/32352\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorImpact\":\"Failed exploit attempts will likely cause a denial-of-service condition.\"}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.