Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
serverprotect vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2021-25225
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local malicious user to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first o...
Trendmicro Serverprotect 3.0
2.1
CVSSv2
CVE-2021-25226
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local malicious user to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scan engine component. An attacker must first obta...
Trendmicro Serverprotect 3.0
4.3
CVSSv2
CVE-2017-9032
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote malicious users to inject arbitrary web script or HTML via the (1) T1 or (2) tmLastConfigFileModifiedDate parameter to log_management.cgi.
Trendmicro Serverprotect 3.0
10
CVSSv2
CVE-2017-9034
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows malicious users to write to arbitrary files and consequently execute arbitrary code with root privileges by leveraging failure to validate software updates.
Trendmicro Serverprotect 3.0
5.8
CVSSv2
CVE-2017-9035
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows malicious users to eavesdrop and tamper with updates by leveraging unencrypted communications with update servers.
Trendmicro Serverprotect 3.0
4.3
CVSSv2
CVE-2017-9037
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote malicious users to inject arbitrary web script or HTML via the (1) S44, (2) S5, (3) S_action_fail, (4) S_ptn_update, (5) T113, (6) T114, (7) T115, (8) T11711...
Trendmicro Serverprotect 3.0
10
CVSSv2
CVE-2007-4731
Stack-based buffer overflow in the TMregChange function in TMReg.dll in Trend Micro ServerProtect prior to 5.58 Security Patch 4 allows remote malicious users to execute arbitrary code via a crafted packet to TCP port 5005.
Trend Micro Serverprotect
7.5
CVSSv2
CVE-2005-1929
Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and previous versions, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote malicious users to execute arbitrary code...
Trend Micro Serverprotect
10
CVSSv2
CVE-2007-6507
SpntSvc.exe daemon in Trend Micro ServerProtect 5.58 for Windows, before Security Patch 4, exposes unspecified dangerous sub-functions from StRpcSrv.dll in the DCE/RPC interface, which allows remote malicious users to obtain "full file system access" and execute arbitra...
Trend Micro Serverprotect 5.58 Security Patch 3
10
CVSSv2
CVE-2007-2528
Buffer overflow in AgRpcCln.dll for Trend Micro ServerProtect 5.58 for Windows before Security Patch 3 Build 1176 allows remote malicious users to execute arbitrary code via unknown vectors related to RPC requests. NOTE: this is probably a different vulnerability than CVE-2007-25...
Trend Micro Serverprotect 5.58
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »