Page 3 of 14 results (0.006 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

eTrust InoculateIT 6.0 with the "Incremental Scan" option enabled may certify that a file is free of viruses before the file has been completely downloaded, which allows remote attackers to bypass virus detection. • http://securitytracker.com/id?1005740 http://www.derkeiler.com/Mailing-Lists/NT-Bugtraq/2002-12/0003.html https://exchange.xforce.ibmcloud.com/vulnerabilities/10770 • CWE-16: Configuration •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

ftpdownload in Computer Associates InoculateIT 6.0 allows a local attacker to overwrite arbitrary files via a symlink attack on /tmp/ftpdownload.log . • http://archives.neohapsis.com/archives/bugtraq/2001-05/0245.html http://www.osvdb.org/1843 http://www.securityfocus.com/bid/2778 https://exchange.xforce.ibmcloud.com/vulnerabilities/6607 •

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 2

Computer Associates InoculateIT Agent for Exchange Server does not recognize an e-mail virus attachment if the SMTP header is missing the "From" field, which allows remote attackers to bypass virus protection. • https://www.exploit-db.com/exploits/20401 http://archives.neohapsis.com/archives/bugtraq/2000-11/0158.html •

CVSS: 7.5EPSS: 12%CPEs: 1EXPL: 0

AV Option for MS Exchange Server option for InoculateIT 4.53, and possibly other versions, only scans the Inbox folder tree of a Microsoft Exchange server, which could allow viruses to escape detection if a user's rules cause the message to be moved to a different mailbox. • http://marc.info/?l=ntbugtraq&m=92652152723629&w=2 http://marc.info/?l=ntbugtraq&m=97439568517355&w=2 •