Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro serverprotect vulnerabilities and exploits
(subscribe to this query)
801
VMScore
CVE-2020-24561
A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an malicious user to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.
Trendmicro Serverprotect 3.0
694
VMScore
CVE-2006-6458
The Trend Micro scan engine prior to 8.320 for Windows and prior to 8.150 on HP-UX and AIX, as used in Trend Micro PC Cillin - Internet Security 2006, Office Scan 7.3, and Server Protect 5.58, allows remote malicious users to cause a denial of service (CPU consumption and system ...
Trend Micro Serverprotect 5.58
Trend Micro Officescan 7.3
Trend Micro Pc Cillin - Internet Security 2006
694
VMScore
CVE-2005-1928
Trend Micro ServerProtect EarthAgent for Windows Management Console 5.58 and possibly earlier versions, when running with Trend Micro Control Manager 2.5 and 3.0, and Damage Cleanup Server 1.1, allows remote malicious users to cause a denial of service (CPU consumption) via a flo...
Trend Micro Serverprotect Earthagent 5.58
668
VMScore
CVE-2022-25329
Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perfo...
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect For Network Appliance Filer 5.8
Trendmicro Serverprotect For Storage 6.0
668
VMScore
CVE-2022-25330
Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote malicious user to crash the process or achieve remote code execution.
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect For Network Appliance Filer 5.8
Trendmicro Serverprotect For Storage 6.0
668
VMScore
CVE-2007-1168
Trend Micro ServerProtect for Linux (SPLX) 1.25, 1.3, and 2.5 prior to 20070216 allows remote malicious users to access arbitrary web pages and reconfigure the product via HTTP requests with the splx_2376_info cookie to the web interface port (14942/tcp).
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Serverprotect 1.3
Trend Micro Serverprotect 2.5
668
VMScore
CVE-2005-1929
Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and previous versions, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote malicious users to execute arbitrary code...
Trend Micro Serverprotect
668
VMScore
CVE-2005-0533
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI prior to 7.510, as used in multiple Trend Micro products, allows remote malicious users to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Trend Micro Control Manager Gold
Trend Micro Interscan Emanager 3.5.2
Trend Micro Interscan Emanager 3.6
Trend Micro Interscan Messaging Security Suite 5.5
Trend Micro Interscan Viruswall 3.5
Trend Micro Interscan Viruswall 3.52
Trend Micro Interscan Viruswall 5.1
Trend Micro Interscan Viruswall Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Interscan Webmanager 1.2
Trend Micro Interscan Webmanager 2.1
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 5.58
Trend Micro Pc-cillin 2000
Trend Micro Scanmail 2.51
Trend Micro Scanmail 3.8
Trend Micro Scanmail 6.1
Trend Micro Scanmail Gold
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Client-server Suite Smb Gold
Trend Micro Interscan Messaging Security Suite Gold
641
VMScore
CVE-2020-8607
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a syst...
Trendmicro Antivirus Toolkit
Trendmicro Apex One 2019
Trendmicro Apex One Saas
Trendmicro Deep Security 9.6
Trendmicro Deep Security 10.0
Trendmicro Deep Security 11.0
Trendmicro Deep Security 12.0
Trendmicro Officescan Xg
Trendmicro Officescan Business Security 9.0
Trendmicro Officescan Business Security 9.5
Trendmicro Officescan Business Security 10.0
Trendmicro Officescan Business Security Service -
Trendmicro Officescan Cloud 15
Trendmicro Officescan Cloud 16.0
Trendmicro Online Scan 8.0
Trendmicro Portable Security 2.0
Trendmicro Portable Security 3.0
Trendmicro Rootkit Buster 2.2
Trendmicro Safe Lock -
Trendmicro Safe Lock 2.0
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect 6.0
641
VMScore
CVE-2017-9036
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows local users to gain privileges by leveraging an unrestricted quarantine directory.
Trendmicro Serverprotect 3.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3380
CVE-2024-1694
local file inclusion
CVE-2024-5645
CVE-2024-24919
XSS
CVE-2024-36774
CVE-2024-21306
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »