{"api_version":"1","generated_at":"2026-04-23T15:09:18+00:00","cve":"CVE-2001-0958","urls":{"html":"https://cve.report/CVE-2001-0958","api":"https://cve.report/api/cve/CVE-2001-0958.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2001-0958","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2001-0958"},"summary":{"title":"CVE-2001-0958","description":"Buffer overflows in eManager plugin for Trend Micro InterScan VirusWall for NT 3.51 and 3.51J allow remote attackers to execute arbitrary code via long arguments to the CGI programs (1) register.dll, (2) ContentFilter.dll, (3) SFNofitication.dll, (4) register.dll, (5) TOP10.dll, (6) SpamExcp.dll, and (7) spamrule.dll.","state":"PUBLISHED","assigner":"mitre","published_at":"2001-09-12 04:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.trendmicro.co.jp/esolution/solutionDetail.asp?solutionID=3142","name":"http://www.trendmicro.co.jp/esolution/solutionDetail.asp?solutionID=3142","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"個人のお客さまサポート · Trend Micro for Home","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7104","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7104","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2001-09/0099.html","name":"http://archives.neohapsis.com/archives/bugtraq/2001-09/0099.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"],"title":"Neohapsis Archives - Bugtraq - [SNS Advisory No.42] Trend Micro InterScan eManager for NT Multiple Program Buffer Overflow Vulnerability - From snsadv@lac.co.jp","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/3327","name":"http://www.securityfocus.com/bid/3327","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Trend Micro InterScan eManager Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2001-0958","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2001-0958","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2001","cve_id":"958","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_emanager","cpe6":"3.51","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"958","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_emanager","cpe6":"3.51_j","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"958","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"958","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.2.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"958","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2001","cve_id":"958","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.32","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T04:37:07.123Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"interscan-emanager-bo(7104)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7104"},{"name":"20010912 [SNS Advisory No.42] Trend Micro InterScan eManager for NT Multiple Program Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://archives.neohapsis.com/archives/bugtraq/2001-09/0099.html"},{"name":"3327","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/3327"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.trendmicro.co.jp/esolution/solutionDetail.asp?solutionID=3142"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2001-09-12T00:00:00.000Z","descriptions":[{"lang":"en","value":"Buffer overflows in eManager plugin for Trend Micro InterScan VirusWall for NT 3.51 and 3.51J allow remote attackers to execute arbitrary code via long arguments to the CGI programs (1) register.dll, (2) ContentFilter.dll, (3) SFNofitication.dll, (4) register.dll, (5) TOP10.dll, (6) SpamExcp.dll, and (7) spamrule.dll."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-12-18T21:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"interscan-emanager-bo(7104)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7104"},{"name":"20010912 [SNS Advisory No.42] Trend Micro InterScan eManager for NT Multiple Program Buffer Overflow Vulnerability","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://archives.neohapsis.com/archives/bugtraq/2001-09/0099.html"},{"name":"3327","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/3327"},{"tags":["x_refsource_MISC"],"url":"http://www.trendmicro.co.jp/esolution/solutionDetail.asp?solutionID=3142"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2001-0958","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Buffer overflows in eManager plugin for Trend Micro InterScan VirusWall for NT 3.51 and 3.51J allow remote attackers to execute arbitrary code via long arguments to the CGI programs (1) register.dll, (2) ContentFilter.dll, (3) SFNofitication.dll, (4) register.dll, (5) TOP10.dll, (6) SpamExcp.dll, and (7) spamrule.dll."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"interscan-emanager-bo(7104)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7104"},{"name":"20010912 [SNS Advisory No.42] Trend Micro InterScan eManager for NT Multiple Program Buffer Overflow Vulnerability","refsource":"BUGTRAQ","url":"http://archives.neohapsis.com/archives/bugtraq/2001-09/0099.html"},{"name":"3327","refsource":"BID","url":"http://www.securityfocus.com/bid/3327"},{"name":"http://www.trendmicro.co.jp/esolution/solutionDetail.asp?solutionID=3142","refsource":"MISC","url":"http://www.trendmicro.co.jp/esolution/solutionDetail.asp?solutionID=3142"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2001-0958","datePublished":"2002-02-02T05:00:00.000Z","dateReserved":"2002-01-31T00:00:00.000Z","dateUpdated":"2024-08-08T04:37:07.123Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2001-09-12 04:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_emanager:3.51:*:*:*:*:*:*:*","matchCriteriaId":"8DF73278-A5E9-4975-9C0B-DD9413A33FA4"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_emanager:3.51_j:*:*:*:*:*:*:*","matchCriteriaId":"A7F86817-D352-452E-B80F-1402C8A76372"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:*:*:*:*:*:*:*","matchCriteriaId":"DEC14336-CD53-44F7-B271-3C98C016295B"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.2.3:*:*:*:*:*:*:*","matchCriteriaId":"D948171A-3B54-462A-8B2E-2C0266A37E94"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.3:*:*:*:*:*:*:*","matchCriteriaId":"7A9D4E2E-889B-4233-8887-9CF00A5023A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.32:*:*:*:*:*:*:*","matchCriteriaId":"2F72A6DE-BA1B-4907-B19D-D71B172BB249"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2001","CveId":"958","Ordinal":"1","Title":"CVE-2001-0958","CVE":"CVE-2001-0958","Year":"2001"},"notes":[{"CveYear":"2001","CveId":"958","Ordinal":"1","NoteData":"Buffer overflows in eManager plugin for Trend Micro InterScan VirusWall for NT 3.51 and 3.51J allow remote attackers to execute arbitrary code via long arguments to the CGI programs (1) register.dll, (2) ContentFilter.dll, (3) SFNofitication.dll, (4) register.dll, (5) TOP10.dll, (6) SpamExcp.dll, and (7) spamrule.dll.","Type":"Description","Title":"CVE-2001-0958"},{"CveYear":"2001","CveId":"958","Ordinal":"2","NoteData":"2002-02-02","Type":"Other","Title":"Published"},{"CveYear":"2001","CveId":"958","Ordinal":"3","NoteData":"2017-12-18","Type":"Other","Title":"Modified"}]}}}