Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
serverprotect vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-0074
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote malicious users to execute arbitrary code via unknown vectors, possibly related to a folder read operation over RPC.
Trend Micro Serverprotect 5.7
Trend Micro Serverprotect 5.58
9.8
CVSSv3
CVE-2022-25330
Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote malicious user to crash the process or achieve remote code execution.
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect For Network Appliance Filer 5.8
Trendmicro Serverprotect For Storage 6.0
7.5
CVSSv3
CVE-2022-25331
Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote malicious user to crash the process.
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect For Network Appliance Filer 5.8
Trendmicro Serverprotect For Storage 6.0
9.8
CVSSv3
CVE-2022-25329
Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perfo...
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect For Network Appliance Filer 5.8
Trendmicro Serverprotect For Storage 6.0
6.7
CVSSv3
CVE-2020-28575
A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an malicious user to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in orde...
Trendmicro Serverprotect 3.0
9.1
CVSSv3
CVE-2020-24561
A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an malicious user to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.
Trendmicro Serverprotect 3.0
6.1
CVSSv3
CVE-2017-9032
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote malicious users to inject arbitrary web script or HTML via the (1) T1 or (2) tmLastConfigFileModifiedDate parameter to log_management.cgi.
Trendmicro Serverprotect 3.0
8.8
CVSSv3
CVE-2017-9033
Cross-site request forgery (CSRF) vulnerability in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows remote malicious users to hijack the authentication of users for requests to start an update from an arbitrary source via a crafted request to SProtectLinux/scanoption...
Trendmicro Serverprotect 3.0
9.8
CVSSv3
CVE-2017-9034
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows malicious users to write to arbitrary files and consequently execute arbitrary code with root privileges by leveraging failure to validate software updates.
Trendmicro Serverprotect 3.0
7.4
CVSSv3
CVE-2017-9035
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows malicious users to eavesdrop and tamper with updates by leveraging unencrypted communications with update servers.
Trendmicro Serverprotect 3.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »