Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro serverprotect 3.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2017-9034
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows malicious users to write to arbitrary files and consequently execute arbitrary code with root privileges by leveraging failure to validate software updates.
Trendmicro Serverprotect 3.0
9
CVSSv2
CVE-2020-24561
A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an malicious user to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.
Trendmicro Serverprotect 3.0
7.2
CVSSv2
CVE-2020-8607
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a syst...
Trendmicro Antivirus Toolkit
Trendmicro Apex One 2019
Trendmicro Apex One Saas
Trendmicro Deep Security 9.6
Trendmicro Deep Security 10.0
Trendmicro Deep Security 11.0
Trendmicro Deep Security 12.0
Trendmicro Officescan Xg
Trendmicro Officescan Business Security 9.0
Trendmicro Officescan Business Security 9.5
Trendmicro Officescan Business Security 10.0
Trendmicro Officescan Business Security Service -
Trendmicro Officescan Cloud 15
Trendmicro Officescan Cloud 16.0
Trendmicro Online Scan 8.0
Trendmicro Portable Security 2.0
Trendmicro Portable Security 3.0
Trendmicro Rootkit Buster 2.2
Trendmicro Safe Lock -
Trendmicro Safe Lock 2.0
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect 6.0
7.2
CVSSv2
CVE-2017-9036
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows local users to gain privileges by leveraging an unrestricted quarantine directory.
Trendmicro Serverprotect 3.0
6.8
CVSSv2
CVE-2017-9033
Cross-site request forgery (CSRF) vulnerability in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows remote malicious users to hijack the authentication of users for requests to start an update from an arbitrary source via a crafted request to SProtectLinux/scanoption...
Trendmicro Serverprotect 3.0
5.8
CVSSv2
CVE-2017-9035
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows malicious users to eavesdrop and tamper with updates by leveraging unencrypted communications with update servers.
Trendmicro Serverprotect 3.0
4.6
CVSSv2
CVE-2020-28575
A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an malicious user to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in orde...
Trendmicro Serverprotect 3.0
4.3
CVSSv2
CVE-2017-9032
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote malicious users to inject arbitrary web script or HTML via the (1) T1 or (2) tmLastConfigFileModifiedDate parameter to log_management.cgi.
Trendmicro Serverprotect 3.0
4.3
CVSSv2
CVE-2017-9037
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote malicious users to inject arbitrary web script or HTML via the (1) S44, (2) S5, (3) S_action_fail, (4) S_ptn_update, (5) T113, (6) T114, (7) T115, (8) T11711...
Trendmicro Serverprotect 3.0
2.1
CVSSv2
CVE-2021-25224
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local malicious user to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obta...
Trendmicro Serverprotect 3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »