Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro serverprotect vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2022-25329
Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perfo...
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect For Network Appliance Filer 5.8
Trendmicro Serverprotect For Storage 6.0
9.8
CVSSv3
CVE-2022-25330
Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote malicious user to crash the process or achieve remote code execution.
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect For Network Appliance Filer 5.8
Trendmicro Serverprotect For Storage 6.0
9.8
CVSSv3
CVE-2021-36745
A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote malicious user to bypass authentication on affected i...
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect 6.0
9.8
CVSSv3
CVE-2017-9034
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows malicious users to write to arbitrary files and consequently execute arbitrary code with root privileges by leveraging failure to validate software updates.
Trendmicro Serverprotect 3.0
9.1
CVSSv3
CVE-2020-24561
A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an malicious user to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.
Trendmicro Serverprotect 3.0
8.8
CVSSv3
CVE-2017-9033
Cross-site request forgery (CSRF) vulnerability in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows remote malicious users to hijack the authentication of users for requests to start an update from an arbitrary source via a crafted request to SProtectLinux/scanoption...
Trendmicro Serverprotect 3.0
7.8
CVSSv3
CVE-2017-9036
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows local users to gain privileges by leveraging an unrestricted quarantine directory.
Trendmicro Serverprotect 3.0
7.5
CVSSv3
CVE-2022-25331
Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote malicious user to crash the process.
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect For Network Appliance Filer 5.8
Trendmicro Serverprotect For Storage 6.0
7.4
CVSSv3
CVE-2017-9035
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows malicious users to eavesdrop and tamper with updates by leveraging unencrypted communications with update servers.
Trendmicro Serverprotect 3.0
7
CVSSv3
CVE-2019-14688
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable duri...
Trendmicro Control Manager 7.0
Trendmicro Endpoint Sensor 1.6
Trendmicro Im Security 1.6.5
Trendmicro Mobile Security 9.8
Trendmicro Officescan Xg
Trendmicro Scanmail 14.0
Trendmicro Security 2019
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect 6.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »