Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
serverprotect vulnerabilities and exploits
(subscribe to this query)
6.1
CVSSv3
CVE-2017-9037
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote malicious users to inject arbitrary web script or HTML via the (1) S44, (2) S5, (3) S_action_fail, (4) S_ptn_update, (5) T113, (6) T114, (7) T115, (8) T11711...
Trendmicro Serverprotect 3.0
9.1
CVSSv3
CVE-2020-24561
A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an malicious user to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.
Trendmicro Serverprotect 3.0
5.5
CVSSv3
CVE-2021-25224
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local malicious user to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obta...
Trendmicro Serverprotect 3.0
5.5
CVSSv3
CVE-2021-25225
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local malicious user to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first o...
Trendmicro Serverprotect 3.0
5.5
CVSSv3
CVE-2021-25226
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local malicious user to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scan engine component. An attacker must first obta...
Trendmicro Serverprotect 3.0
6.7
CVSSv3
CVE-2020-28575
A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an malicious user to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in orde...
Trendmicro Serverprotect 3.0
NA
CVE-2007-4731
Stack-based buffer overflow in the TMregChange function in TMReg.dll in Trend Micro ServerProtect prior to 5.58 Security Patch 4 allows remote malicious users to execute arbitrary code via a crafted packet to TCP port 5005.
Trend Micro Serverprotect
NA
CVE-2007-2508
Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote malicious users to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the A...
Trend Micro Serverprotect
3 EDB exploits
NA
CVE-2007-2528
Buffer overflow in AgRpcCln.dll for Trend Micro ServerProtect 5.58 for Windows before Security Patch 3 Build 1176 allows remote malicious users to execute arbitrary code via unknown vectors related to RPC requests. NOTE: this is probably a different vulnerability than CVE-2007-25...
Trend Micro Serverprotect 5.58
NA
CVE-2007-4218
Multiple buffer overflows in the ServerProtect service (SpntSvc.exe) in Trend Micro ServerProtect for Windows prior to 5.58 Security Patch 4 allow remote malicious users to execute arbitrary code via certain RPC requests to certain TCP ports that are processed by the (1) RPCFN_EN...
Trend Micro Serverprotect 5.58
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3201
CVE-2024-4779
CVE-2024-35090
CVE-2024-5084
hard-coded
CVE-2024-4985
HTML injection
CVE-2024-33655
local file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »