{"api_version":"1","generated_at":"2026-04-23T09:38:20+00:00","cve":"CVE-2005-0533","urls":{"html":"https://cve.report/CVE-2005-0533","api":"https://cve.report/api/cve/CVE-2005-0533.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2005-0533","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2005-0533"},"summary":{"title":"CVE-2005-0533","description":"Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.","state":"PUBLISHED","assigner":"mitre","published_at":"2005-05-02 04:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://xforce.iss.net/xforce/alerts/id/189","name":"http://xforce.iss.net/xforce/alerts/id/189","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://securitytracker.com/id?1013290","name":"http://securitytracker.com/id?1013290","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"SecurityTracker.com Archives - TrendMicro PC-cillin Buffer Overflow in ARJ Parser Lets Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+VSAPI+ARJ+parsing+could+allow+Remote+Code+execution","name":"http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+VSAPI+ARJ+parsing+could+allow+Remote+Code+execution","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Vulnerability in VSAPI ARJ parsing could allow Remote Code execution","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1013289","name":"http://securitytracker.com/id?1013289","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"SecurityTracker.com Archives - TrendMicro OfficeScan Buffer Overflow in ARJ Parser Lets Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/14396","name":"http://secunia.com/advisories/14396","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Trend Micro Products AntiVirus Library Buffer Overflow","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/12643","name":"http://www.securityfocus.com/bid/12643","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Trend Micro VSAPI ARJ Handling Heap Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2005-0533","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0533","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"client-server-messaging_suite_smb","cpe6":"gold","cpe7":"*","cpe8":"windows","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"client-server_suite_smb","cpe6":"gold","cpe7":"*","cpe8":"windows","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"control_manager","cpe6":"gold","cpe7":"*","cpe8":"as_400","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"control_manager","cpe6":"gold","cpe7":"*","cpe8":"solaris","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"control_manager","cpe6":"gold","cpe7":"*","cpe8":"s_390","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"control_manager","cpe6":"gold","cpe7":"*","cpe8":"windows","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"control_manager","cpe6":"gold","cpe7":"*","cpe8":"windows_nt","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"control_manager","cpe6":"netware","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_emanager","cpe6":"3.5","cpe7":"*","cpe8":"hp","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_emanager","cpe6":"3.5.2","cpe7":"*","cpe8":"windows","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_emanager","cpe6":"3.51","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_emanager","cpe6":"3.51_j","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_emanager","cpe6":"3.6","cpe7":"*","cpe8":"linux","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_emanager","cpe6":"3.6","cpe7":"*","cpe8":"sun","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_messaging_security_suite","cpe6":"3.81","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_messaging_security_suite","cpe6":"5.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_messaging_security_suite","cpe6":"gold","cpe7":"*","cpe8":"linux","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_messaging_security_suite","cpe6":"gold","cpe7":"*","cpe8":"solaris","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_messaging_security_suite","cpe6":"gold","cpe7":"*","cpe8":"windows","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.0.1","cpe7":"*","cpe8":"linux","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.0.1","cpe7":"*","cpe8":"unix","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.4","cpe7":"*","cpe8":"windows_nt","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.5","cpe7":"*","cpe8":"windows_nt","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.51","cpe7":"*","cpe8":"windows_nt","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.52","cpe7":"*","cpe8":"windows_nt","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.52_build1466","cpe7":"*","cpe8":"windows_nt","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.6","cpe7":"*","cpe8":"hp_ux","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.6","cpe7":"*","cpe8":"solaris","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.6","cpe7":"*","cpe8":"unix","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.6","cpe7":"*","cpe8":"windows_nt","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"3.6.5","cpe7":"*","cpe8":"linux","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"5.1","cpe7":"*","cpe8":"windows_nt","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"gold","cpe7":"*","cpe8":"aix","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"gold","cpe7":"*","cpe8":"linux_for_smb","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"gold","cpe7":"*","cpe8":"smb","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"gold","cpe7":"*","cpe8":"windows","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_viruswall","cpe6":"gold","cpe7":"*","cpe8":"windows_nt_for_smb","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_webmanager","cpe6":"1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_webmanager","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_webmanager","cpe6":"2.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_webprotect","cpe6":"gold","cpe7":"*","cpe8":"isa","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_web_security_suite","cpe6":"gold","cpe7":"*","cpe8":"linux","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_web_security_suite","cpe6":"gold","cpe7":"*","cpe8":"solaris","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"interscan_web_security_suite","cpe6":"gold","cpe7":"*","cpe8":"windows","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"officescan","cpe6":"3.0","cpe7":"*","cpe8":"corporate","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"officescan","cpe6":"corporate_3.0","cpe7":"*","cpe8":"windows_nt_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"officescan","cpe6":"corporate_3.1.1","cpe7":"*","cpe8":"windows_nt_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"officescan","cpe6":"corporate_3.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"officescan","cpe6":"corporate_3.11","cpe7":"*","cpe8":"windows_nt_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"officescan","cpe6":"corporate_3.13","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"officescan","cpe6":"corporate_3.13","cpe7":"*","cpe8":"windows_nt_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"officescan","cpe6":"corporate_3.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"officescan","cpe6":"corporate_3.5","cpe7":"*","cpe8":"windows_nt_server","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"officescan","cpe6":"corporate_3.54","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"officescan","cpe6":"corporate_5.02","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"officescan","cpe6":"corporate_5.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"officescan","cpe6":"corporate_5.58","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"officescan","cpe6":"corporate_6.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"pc-cillin","cpe6":"2000","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"pc-cillin","cpe6":"2002","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"pc-cillin","cpe6":"2003","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"pc-cillin","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"portalprotect","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"scanmail","cpe6":"2.51","cpe7":"*","cpe8":"domino","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"scanmail","cpe6":"2.6","cpe7":"*","cpe8":"domino","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"scanmail","cpe6":"3.8","cpe7":"*","cpe8":"microsoft_exchange","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"scanmail","cpe6":"3.81","cpe7":"*","cpe8":"microsoft_exchange","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"scanmail","cpe6":"6.1","cpe7":"*","cpe8":"microsoft_exchange","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"scanmail","cpe6":"gold","cpe7":"*","cpe8":"lotus_domino_on_aix","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"scanmail","cpe6":"gold","cpe7":"*","cpe8":"lotus_domino_on_as_400","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"scanmail","cpe6":"gold","cpe7":"*","cpe8":"lotus_domino_on_solaris","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"scanmail","cpe6":"gold","cpe7":"*","cpe8":"lotus_domino_on_s_390","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"scanmail","cpe6":"gold","cpe7":"*","cpe8":"lotus_domino_on_windows","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"scanmail_emanager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"serverprotect","cpe6":"1.25_2007-02-16","cpe7":"*","cpe8":"linux","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"serverprotect","cpe6":"1.3","cpe7":"*","cpe8":"linux","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"serverprotect","cpe6":"2.5","cpe7":"*","cpe8":"linux","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trend_micro","cpe5":"serverprotect","cpe6":"5.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T21:13:54.240Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+VSAPI+ARJ+parsing+could+allow+Remote+Code+execution"},{"name":"1013290","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1013290"},{"name":"1013289","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1013289"},{"name":"20050224 Trend Micro AntiVirus Library Heap Overflow","tags":["third-party-advisory","x_refsource_ISS","x_transferred"],"url":"http://xforce.iss.net/xforce/alerts/id/189"},{"name":"14396","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/14396"},{"name":"12643","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/12643"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-02-24T00:00:00.000Z","descriptions":[{"lang":"en","value":"Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2005-02-28T10:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+VSAPI+ARJ+parsing+could+allow+Remote+Code+execution"},{"name":"1013290","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1013290"},{"name":"1013289","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1013289"},{"name":"20050224 Trend Micro AntiVirus Library Heap Overflow","tags":["third-party-advisory","x_refsource_ISS"],"url":"http://xforce.iss.net/xforce/alerts/id/189"},{"name":"14396","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/14396"},{"name":"12643","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/12643"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2005-0533","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+VSAPI+ARJ+parsing+could+allow+Remote+Code+execution","refsource":"CONFIRM","url":"http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+VSAPI+ARJ+parsing+could+allow+Remote+Code+execution"},{"name":"1013290","refsource":"SECTRACK","url":"http://securitytracker.com/id?1013290"},{"name":"1013289","refsource":"SECTRACK","url":"http://securitytracker.com/id?1013289"},{"name":"20050224 Trend Micro AntiVirus Library Heap Overflow","refsource":"ISS","url":"http://xforce.iss.net/xforce/alerts/id/189"},{"name":"14396","refsource":"SECUNIA","url":"http://secunia.com/advisories/14396"},{"name":"12643","refsource":"BID","url":"http://www.securityfocus.com/bid/12643"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2005-0533","datePublished":"2005-02-24T05:00:00.000Z","dateReserved":"2005-02-24T00:00:00.000Z","dateUpdated":"2024-08-07T21:13:54.240Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-05-02 04:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:client-server-messaging_suite_smb:gold:*:windows:*:*:*:*:*","matchCriteriaId":"8C9AAAD5-E973-41CB-B7FD-85D1EA04F6D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:client-server_suite_smb:gold:*:windows:*:*:*:*:*","matchCriteriaId":"664CD81D-30AD-450B-A9FF-7C0FC61C938A"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:control_manager:gold:*:as_400:*:*:*:*:*","matchCriteriaId":"CEEC709C-CE2F-435D-8595-3B7462F5D58A"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:control_manager:gold:*:s_390:*:*:*:*:*","matchCriteriaId":"416653F7-D8D5-4947-A097-8E1298DD0FEE"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:control_manager:gold:*:solaris:*:*:*:*:*","matchCriteriaId":"0416D605-20FC-4C87-8009-C240530A1B13"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:control_manager:gold:*:windows:*:*:*:*:*","matchCriteriaId":"4FFD939A-C783-4A02-9859-B823A57F8A5E"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:control_manager:gold:*:windows_nt:*:*:*:*:*","matchCriteriaId":"723E2C95-124F-422F-A241-AECA1D5E0D0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:control_manager:netware:*:*:*:*:*:*:*","matchCriteriaId":"2A63C770-365B-4EAF-AF4B-1B379F943DF2"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_emanager:3.5:*:hp:*:*:*:*:*","matchCriteriaId":"9D2CAA96-4C71-482B-A033-E4AD0814C638"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_emanager:3.5.2:*:windows:*:*:*:*:*","matchCriteriaId":"0DEAD496-BB59-464D-9BBA-29158CF65C35"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_emanager:3.6:*:linux:*:*:*:*:*","matchCriteriaId":"8767F042-4333-404A-B7D7-6830B6959890"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_emanager:3.6:*:sun:*:*:*:*:*","matchCriteriaId":"C02396DD-CFBF-4019-8AC7-9C41821AF8E2"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_emanager:3.51:*:*:*:*:*:*:*","matchCriteriaId":"8DF73278-A5E9-4975-9C0B-DD9413A33FA4"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_emanager:3.51_j:*:*:*:*:*:*:*","matchCriteriaId":"A7F86817-D352-452E-B80F-1402C8A76372"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_messaging_security_suite:3.81:*:*:*:*:*:*:*","matchCriteriaId":"4086086F-4F57-4E73-B473-FFF33CD23F6E"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_messaging_security_suite:5.5:*:*:*:*:*:*:*","matchCriteriaId":"0F1E2358-2868-4D95-A783-0D7A591A691C"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:*:linux:*:*:*:*:*","matchCriteriaId":"7E8ADD8C-2E58-4671-BECF-B02A5DE04A1E"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:*:solaris:*:*:*:*:*","matchCriteriaId":"4CD5D110-5FA3-4F6C-A727-06A73676EC9A"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:*:windows:*:*:*:*:*","matchCriteriaId":"CD824873-B625-4755-ADC9-C6657CD63208"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:*:linux:*:*:*:*:*","matchCriteriaId":"E4B9603D-79FE-4E7C-A9F9-E9A24FBBDF3E"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:*:unix:*:*:*:*:*","matchCriteriaId":"475CED59-77F7-4E6B-8DB6-EFFC7F8D5929"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.4:*:windows_nt:*:*:*:*:*","matchCriteriaId":"75734296-9435-4A96-B30C-572BF1BBAD14"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.5:*:windows_nt:*:*:*:*:*","matchCriteriaId":"61C0968D-D8F1-450C-B4E9-94535B4CF637"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:hp_ux:*:*:*:*:*","matchCriteriaId":"106EB780-7455-41F7-ADB0-67C541F6C53F"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:solaris:*:*:*:*:*","matchCriteriaId":"A9EB55C4-00FB-4D2F-993D-27269F09CF08"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:unix:*:*:*:*:*","matchCriteriaId":"1D8580C2-B757-4C4C-A9B6-960905101E10"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:windows_nt:*:*:*:*:*","matchCriteriaId":"D9AE5039-8467-48C2-8417-E7B18A48F0D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.6.5:*:linux:*:*:*:*:*","matchCriteriaId":"82425C25-4464-4C69-A7C9-6B7369661E3B"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.51:*:windows_nt:*:*:*:*:*","matchCriteriaId":"15B05F1A-7AA1-46E5-947B-C422F9618F9F"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.52:*:windows_nt:*:*:*:*:*","matchCriteriaId":"EB4F32FC-8391-4B3B-AA42-07E392053A96"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.52_build1466:*:windows_nt:*:*:*:*:*","matchCriteriaId":"1BF5CF24-83B8-4AC3-A849-C56979CB38DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:5.1:*:windows_nt:*:*:*:*:*","matchCriteriaId":"25D7EFC1-4053-46E9-9081-3BBAB0300C1B"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:aix:*:*:*:*:*","matchCriteriaId":"8B678239-DD77-488C-82FE-27D6FC47B94A"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:linux_for_smb:*:*:*:*:*","matchCriteriaId":"071EDC78-C902-4D79-8CDF-F5DD30BF7027"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:smb:*:*:*:*:*","matchCriteriaId":"55C6BD67-FE95-43A7-91F7-608DEC79C24A"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:windows:*:*:*:*:*","matchCriteriaId":"29EDFC0F-687B-4B56-8910-67C6E3907483"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:windows_nt_for_smb:*:*:*:*:*","matchCriteriaId":"5A694256-BD24-4EED-9833-B15DCA874F15"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:*:linux:*:*:*:*:*","matchCriteriaId":"1DCB7541-8145-47CA-9F4E-4A600CA454EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:*:solaris:*:*:*:*:*","matchCriteriaId":"DB8B2F17-7C2B-4782-9492-D967A2AD8B3A"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:*:windows:*:*:*:*:*","matchCriteriaId":"D1E65854-8869-41F7-BAFE-B7545FC98BAC"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_webmanager:1.2:*:*:*:*:*:*:*","matchCriteriaId":"B1C33920-9BC7-41BC-BB66-723D0BAF2839"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_webmanager:2.0:*:*:*:*:*:*:*","matchCriteriaId":"A73B43D9-A721-4D48-A2D6-48A77355965F"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_webmanager:2.1:*:*:*:*:*:*:*","matchCriteriaId":"F1F3645D-2B7D-44ED-83DE-ABF9016CD0D3"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_webprotect:gold:*:isa:*:*:*:*:*","matchCriteriaId":"921B617D-F37E-4D10-A627-09F9678790B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:3.0:*:corporate:*:*:*:*:*","matchCriteriaId":"4013BF7E-DE8F-4941-BF15-D17C8C88DB78"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:corporate_3.0:*:windows_nt_server:*:*:*:*:*","matchCriteriaId":"093EED07-F4C1-47B2-9D08-3DE0D57D5CA5"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:corporate_3.1.1:*:windows_nt_server:*:*:*:*:*","matchCriteriaId":"CBA9F2BA-1274-465C-B723-ABB54CA17FE9"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:corporate_3.5:*:*:*:*:*:*:*","matchCriteriaId":"BE60F5D9-35D0-4D0E-85D1-EE71E533622F"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:corporate_3.5:*:windows_nt_server:*:*:*:*:*","matchCriteriaId":"6F37307A-7847-4D5A-99D8-8A4BE424CD21"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:corporate_3.11:*:*:*:*:*:*:*","matchCriteriaId":"BF74A292-2B1B-43FC-AA82-CFB04D7644E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:corporate_3.11:*:windows_nt_server:*:*:*:*:*","matchCriteriaId":"925DA405-9719-452C-8369-D4A60CC916C2"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:corporate_3.13:*:*:*:*:*:*:*","matchCriteriaId":"46575AE8-8718-44D8-AF5C-14F7981B3238"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:corporate_3.13:*:windows_nt_server:*:*:*:*:*","matchCriteriaId":"F893D171-7AB3-4422-BA86-021B0211EE36"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:corporate_3.54:*:*:*:*:*:*:*","matchCriteriaId":"A79FBAAA-D6B8-4A05-B8E1-D7549207EA5B"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:corporate_5.02:*:*:*:*:*:*:*","matchCriteriaId":"D6CE3BB4-54BA-48DE-9CFC-C2241D99DA67"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:corporate_5.5:*:*:*:*:*:*:*","matchCriteriaId":"E6F25D89-826B-4FA0-AA8F-CD729F00F9BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:corporate_5.58:*:*:*:*:*:*:*","matchCriteriaId":"BEE87037-D7CC-480B-BBD2-F1802294D4F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:corporate_6.5:*:*:*:*:*:*:*","matchCriteriaId":"3DB43A95-60F8-425A-8434-C07EC799DC68"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:pc-cillin:6.0:*:*:*:*:*:*:*","matchCriteriaId":"ABBAA86F-8DE4-4BC8-B295-89CF981C28D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:pc-cillin:2000:*:*:*:*:*:*:*","matchCriteriaId":"9994E64C-0E8C-4A9C-A321-6A73A16E33AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:pc-cillin:2002:*:*:*:*:*:*:*","matchCriteriaId":"A65282E0-2332-4CAA-9BA9-3794C2CDE960"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:pc-cillin:2003:*:*:*:*:*:*:*","matchCriteriaId":"E56D571B-649D-41E2-A502-6C1EBAB73F62"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:portalprotect:1.0:*:*:*:*:*:*:*","matchCriteriaId":"C991F564-93D1-4E63-8B71-B0C9CD9BECA4"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:scanmail:2.6:*:domino:*:*:*:*:*","matchCriteriaId":"195D657C-4A4B-4832-B1A6-056FB990401E"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:scanmail:2.51:*:domino:*:*:*:*:*","matchCriteriaId":"929BCF43-AC3A-43D0-8819-7673996D216D"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:scanmail:3.8:*:microsoft_exchange:*:*:*:*:*","matchCriteriaId":"3BFF861D-F544-4902-A958-BE566FB85738"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:scanmail:3.81:*:microsoft_exchange:*:*:*:*:*","matchCriteriaId":"3B282BE2-8116-48A7-B6D6-544983FF72C6"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:scanmail:6.1:*:microsoft_exchange:*:*:*:*:*","matchCriteriaId":"C81AFD13-0883-48F5-BD6B-707CFFE07262"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_aix:*:*:*:*:*","matchCriteriaId":"B4963C96-FA13-4E54-8EE3-8E169CACBF4F"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_as_400:*:*:*:*:*","matchCriteriaId":"C3E0300A-27F7-47C1-B725-55FF0BE92FF9"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_s_390:*:*:*:*:*","matchCriteriaId":"FF365F03-F95C-4047-BBA4-42EBD02E823B"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_solaris:*:*:*:*:*","matchCriteriaId":"A2042D38-CF77-4149-9289-B3380F59D794"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_windows:*:*:*:*:*","matchCriteriaId":"D275C0DB-E942-4EB9-B6AA-3112C1A697DA"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:scanmail_emanager:*:*:*:*:*:*:*:*","matchCriteriaId":"E4CE79B6-B9E8-4775-B7BF-90C2758EECE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:serverprotect:1.3:*:linux:*:*:*:*:*","matchCriteriaId":"FB28FE16-F163-4287-9A4E-843C2E67792E"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:serverprotect:1.25_2007-02-16:*:linux:*:*:*:*:*","matchCriteriaId":"6E8704FA-AA3C-4664-A5AA-50F60AE77642"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:serverprotect:2.5:*:linux:*:*:*:*:*","matchCriteriaId":"BEDB64E2-6157-47C1-842E-26A40A885ECD"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:serverprotect:5.3.1:*:*:*:*:*:*:*","matchCriteriaId":"38695C1D-DC51-45EB-9EEB-6E04490AFE6F"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2005","CveId":"533","Ordinal":"1","Title":"CVE-2005-0533","CVE":"CVE-2005-0533","Year":"2005"},"notes":[{"CveYear":"2005","CveId":"533","Ordinal":"1","NoteData":"Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.","Type":"Description","Title":"CVE-2005-0533"},{"CveYear":"2005","CveId":"533","Ordinal":"2","NoteData":"2005-02-24","Type":"Other","Title":"Published"},{"CveYear":"2005","CveId":"533","Ordinal":"3","NoteData":"2005-02-28","Type":"Other","Title":"Modified"}]}}}