Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
serverprotect vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2007-1070
Multiple stack-based buffer overflows in Trend Micro ServerProtect for Windows and EMC 5.58, and for Network Appliance Filer 5.61 and 5.62, allow remote malicious users to execute arbitrary code via crafted RPC requests to TmRpcSrv.dll that trigger overflows when calling the (1) ...
Trend Micro Serverprotect 5.58
Trend Micro Serverprotect 5.58
Trend Micro Serverprotect 5.61
Trend Micro Serverprotect 5.62
2 EDB exploits
10
CVSSv2
CVE-2021-36745
A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote malicious user to bypass authentication on affected i...
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect 6.0
7.5
CVSSv2
CVE-2007-1168
Trend Micro ServerProtect for Linux (SPLX) 1.25, 1.3, and 2.5 prior to 20070216 allows remote malicious users to access arbitrary web pages and reconfigure the product via HTTP requests with the splx_2376_info cookie to the web interface port (14942/tcp).
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Serverprotect 1.3
Trend Micro Serverprotect 2.5
10
CVSSv2
CVE-2007-0072
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote malicious users to execute arbitrary code via unknown vectors, possibly related to a read operation over RPC.
Trend Micro Serverprotect 5.7
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2007-0073
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote malicious users to execute arbitrary code via unknown vectors, possibly related to a file read operation over RPC.
Trend Micro Serverprotect 5.7
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2007-0074
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote malicious users to execute arbitrary code via unknown vectors, possibly related to a folder read operation over RPC.
Trend Micro Serverprotect 5.7
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2006-5269
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote malicious users to execute arbitrary code via unknown vectors, probably related to an RPC interface.
Trend Micro Serverprotect 5.7
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2008-0013
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote malicious users to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CVE-2008-0012 and CVE...
Trend Micro Serverprotect 5.7
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2008-0014
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote malicious users to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CVE-2008-0012 and CVE...
Trend Micro Serverprotect 5.58
Trend Micro Serverprotect 5.7
10
CVSSv2
CVE-2006-5268
Unspecified vulnerability in Trend Micro ServerProtect 5.7 and 5.58 allows remote malicious users to execute arbitrary code via vectors related to obtaining "administrative access to the RPC interface."
Trend Micro Serverprotect 5.7
Trend Micro Serverprotect 5.58
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-3675
CVE-2024-3400
CVE-2024-23557
mass assignment
CVE-2023-1389
local file inclusion
CVE-2024-32596
file upload
CVE-2024-32593
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »