This CPE summary could be partial or incomplete. Please contact us for a detailed listing.


Vendor Trend Micro First view 2002-12-18
Product Pc-Cillin Last view 2007-02-08
Version 2000 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
CPE Product cpe:2.3:a:trend_micro:pc-cillin

Activity : Overall

Related : CVE

  Date Alert Description
9.3 2007-02-08 CVE-2007-0851

Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.

7.5 2005-05-02 CVE-2005-0533

Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.

4.6 2002-12-18 CVE-2002-1349

Buffer overflow in pop3trap.exe for PC-cillin 2000, 2002, and 2003 allows local users to execute arbitrary code via a long input string to TCP port 110 (POP3).

Open Source Vulnerability Database (OSVDB)

id Description
33038 Trend Micro Multiple Products UPX Handling Overflow
14133 Trend Micro Multiple Anti-Virus Products ARJ Archive Handling Overflow
6163 Trend Micro PC-Cillin pop3trap.exe Overflow

Information Assurance Vulnerability Management (IAVM)

id Description
2007-A-0013 Trend Micro Antivirus UPX Compressed PE File Buffer Overflow Vulnerability
Severity: Category I - VMSKEY: V0013605

Snort® IPS/IDS

Date Description
2014-01-10 Trend Micro Products Antivirus Library overflow attempt
RuleID : 15992 - Type : FILE-OTHER - Revision : 7

Nessus® Vulnerability Scanner

id Description
2007-02-21 Name: The remote Windows host is vulnerable to a buffer overflow attack.
File: trendmicro_upx_parsing.nasl - Type: ACT_GATHER_INFO
2005-02-24 Name: The remote host is running an application that is affected by a buffer overfl...
File: trendmicro_arj_overflow.nasl - Type: ACT_GATHER_INFO