Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2003-0646
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple buffer overflows in ActiveX controls used by Trend Micro HouseCall 5.5 and 5.7, and Damage Cleanup Server 1.0, allow remote attackers to execute arbitrary code via long parameter strings.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Trend Micro HouseCall ActiveX控件多个远程缓冲区溢出漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
HouseCall是Trend Micro免费在线病毒扫描系统,需要ActiveX控件安装在用户系统上,这些控件在扫描处理以后还是驻留在用户系统中。 HouseCall控件在处理参数时缺少正确边界缓冲区检查,远程攻击者可以利用这个漏洞构建恶意页面,诱使用户访问,可触发缓冲区溢出,可能以系统权限在系统上执行任意指令。 如果超长或非法加密参数字符串提交给这些控件, 可触发溢出。由于这些ActiveX控件一般标记为"安全"默认,可以在Microsoft Internet浏览器上以默认安全配置下执行,因此攻击者构
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2003-0646
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2003-0646
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2003-0646

No comments yet


Leave a comment