Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro serverprotect 5.58 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2005-1930
Directory traversal vulnerability in the Crystal Report component (rptserver.asp) in Trend Micro ServerProtect Management Console 5.58, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, and possibly earlier versions, allows remote malicious users to read arbit...
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2007-2528
Buffer overflow in AgRpcCln.dll for Trend Micro ServerProtect 5.58 for Windows before Security Patch 3 Build 1176 allows remote malicious users to execute arbitrary code via unknown vectors related to RPC requests. NOTE: this is probably a different vulnerability than CVE-2007-25...
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2007-4219
Integer overflow in the RPCFN_SYNC_TASK function in StRpcSrv.dll, as used by the ServerProtect service (SpntSvc.exe), in Trend Micro ServerProtect for Windows prior to 5.58 Security Patch 4 allows remote malicious users to execute arbitrary code via a certain integer field in a r...
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2007-4490
Multiple buffer overflows in EarthAgent.exe in Trend Micro ServerProtect 5.58 for Windows before Security Patch 4 allow remote malicious users to have an unknown impact via certain RPC function calls to (1) RPCFN_EVENTBACK_DoHotFix or (2) CMD_CHANGE_AGENT_REGISTER_INFO.
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2007-2533
Multiple buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2- Build 1174 allow remote malicious users to execute arbitrary code via a crafted RPC message processed by the (1) the RPCFN_ActiveRollback function in (a) stcommon.dll, or the (2) ENG_SetRealTimeS...
Trend Micro Serverprotect 5.58
7.8
CVSSv2
CVE-2005-1928
Trend Micro ServerProtect EarthAgent for Windows Management Console 5.58 and possibly earlier versions, when running with Trend Micro Control Manager 2.5 and 3.0, and Damage Cleanup Server 1.1, allows remote malicious users to cause a denial of service (CPU consumption) via a flo...
Trend Micro Serverprotect Earthagent 5.58
7.8
CVSSv2
CVE-2006-6458
The Trend Micro scan engine prior to 8.320 for Windows and prior to 8.150 on HP-UX and AIX, as used in Trend Micro PC Cillin - Internet Security 2006, Office Scan 7.3, and Server Protect 5.58, allows remote malicious users to cause a denial of service (CPU consumption and system ...
Trend Micro Pc Cillin - Internet Security 2006
Trend Micro Officescan 7.3
Trend Micro Serverprotect 5.58
5.1
CVSSv2
CVE-2006-0642
Trend Micro ServerProtect 5.58, and possibly InterScan Messaging Security Suite and InterScan Web Security Suite, have a default configuration setting of "Do not scan compressed files when Extracted file count exceeds 500 files," which may be too low in certain circumst...
Trend Micro Interscan Web Security Suite
Trend Micro Interscan Messaging Security Suite
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2007-6507
SpntSvc.exe daemon in Trend Micro ServerProtect 5.58 for Windows, before Security Patch 4, exposes unspecified dangerous sub-functions from StRpcSrv.dll in the DCE/RPC interface, which allows remote malicious users to obtain "full file system access" and execute arbitra...
Trend Micro Serverprotect 5.58 Security Patch 3
10
CVSSv2
CVE-2007-2508
Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote malicious users to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the A...
Trend Micro Serverprotect
3 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »