Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro serverprotect 5.58 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-2528
Buffer overflow in AgRpcCln.dll for Trend Micro ServerProtect 5.58 for Windows before Security Patch 3 Build 1176 allows remote malicious users to execute arbitrary code via unknown vectors related to RPC requests. NOTE: this is probably a different vulnerability than CVE-2007-25...
Trend Micro Serverprotect 5.58
NA
CVE-2007-2533
Multiple buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2- Build 1174 allow remote malicious users to execute arbitrary code via a crafted RPC message processed by the (1) the RPCFN_ActiveRollback function in (a) stcommon.dll, or the (2) ENG_SetRealTimeS...
Trend Micro Serverprotect 5.58
NA
CVE-2007-4490
Multiple buffer overflows in EarthAgent.exe in Trend Micro ServerProtect 5.58 for Windows before Security Patch 4 allow remote malicious users to have an unknown impact via certain RPC function calls to (1) RPCFN_EVENTBACK_DoHotFix or (2) CMD_CHANGE_AGENT_REGISTER_INFO.
Trend Micro Serverprotect 5.58
NA
CVE-2007-4218
Multiple buffer overflows in the ServerProtect service (SpntSvc.exe) in Trend Micro ServerProtect for Windows prior to 5.58 Security Patch 4 allow remote malicious users to execute arbitrary code via certain RPC requests to certain TCP ports that are processed by the (1) RPCFN_EN...
Trend Micro Serverprotect 5.58
NA
CVE-2007-4219
Integer overflow in the RPCFN_SYNC_TASK function in StRpcSrv.dll, as used by the ServerProtect service (SpntSvc.exe), in Trend Micro ServerProtect for Windows prior to 5.58 Security Patch 4 allows remote malicious users to execute arbitrary code via a certain integer field in a r...
Trend Micro Serverprotect 5.58
NA
CVE-2005-1928
Trend Micro ServerProtect EarthAgent for Windows Management Console 5.58 and possibly earlier versions, when running with Trend Micro Control Manager 2.5 and 3.0, and Damage Cleanup Server 1.1, allows remote malicious users to cause a denial of service (CPU consumption) via a flo...
Trend Micro Serverprotect Earthagent 5.58
NA
CVE-2006-6458
The Trend Micro scan engine prior to 8.320 for Windows and prior to 8.150 on HP-UX and AIX, as used in Trend Micro PC Cillin - Internet Security 2006, Office Scan 7.3, and Server Protect 5.58, allows remote malicious users to cause a denial of service (CPU consumption and system ...
Trend Micro Serverprotect 5.58
Trend Micro Officescan 7.3
Trend Micro Pc Cillin - Internet Security 2006
NA
CVE-2006-0642
Trend Micro ServerProtect 5.58, and possibly InterScan Messaging Security Suite and InterScan Web Security Suite, have a default configuration setting of "Do not scan compressed files when Extracted file count exceeds 500 files," which may be too low in certain circumst...
Trend Micro Interscan Web Security Suite
Trend Micro Serverprotect 5.58
Trend Micro Interscan Messaging Security Suite
NA
CVE-2007-2508
Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote malicious users to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the A...
Trend Micro Serverprotect
3 EDB exploits
NA
CVE-2007-4731
Stack-based buffer overflow in the TMregChange function in TMReg.dll in Trend Micro ServerProtect prior to 5.58 Security Patch 4 allows remote malicious users to execute arbitrary code via a crafted packet to TCP port 5005.
Trend Micro Serverprotect
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »