Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
serverprotect vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2007-4218
Multiple buffer overflows in the ServerProtect service (SpntSvc.exe) in Trend Micro ServerProtect for Windows prior to 5.58 Security Patch 4 allow remote malicious users to execute arbitrary code via certain RPC requests to certain TCP ports that are processed by the (1) RPCFN_EN...
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2007-4219
Integer overflow in the RPCFN_SYNC_TASK function in StRpcSrv.dll, as used by the ServerProtect service (SpntSvc.exe), in Trend Micro ServerProtect for Windows prior to 5.58 Security Patch 4 allows remote malicious users to execute arbitrary code via a certain integer field in a r...
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2007-4490
Multiple buffer overflows in EarthAgent.exe in Trend Micro ServerProtect 5.58 for Windows before Security Patch 4 allow remote malicious users to have an unknown impact via certain RPC function calls to (1) RPCFN_EVENTBACK_DoHotFix or (2) CMD_CHANGE_AGENT_REGISTER_INFO.
Trend Micro Serverprotect 5.58
5
CVSSv2
CVE-2005-1930
Directory traversal vulnerability in the Crystal Report component (rptserver.asp) in Trend Micro ServerProtect Management Console 5.58, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, and possibly earlier versions, allows remote malicious users to read arbit...
Trend Micro Serverprotect 5.58
10
CVSSv2
CVE-2007-2533
Multiple buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2- Build 1174 allow remote malicious users to execute arbitrary code via a crafted RPC message processed by the (1) the RPCFN_ActiveRollback function in (a) stcommon.dll, or the (2) ENG_SetRealTimeS...
Trend Micro Serverprotect 5.58
7.8
CVSSv2
CVE-2005-1928
Trend Micro ServerProtect EarthAgent for Windows Management Console 5.58 and possibly earlier versions, when running with Trend Micro Control Manager 2.5 and 3.0, and Damage Cleanup Server 1.1, allows remote malicious users to cause a denial of service (CPU consumption) via a flo...
Trend Micro Serverprotect Earthagent 5.58
5
CVSSv2
CVE-2007-1169
The web interface in Trend Micro ServerProtect for Linux (SPLX) 1.25, 1.3, and 2.5 prior to 20070216 accepts logon requests through unencrypted HTTP, which might allow remote malicious users to obtain credentials by sniffing the network.
Trend Micro Serverprotect 1.25 2007-02-16
5.1
CVSSv2
CVE-2019-14688
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable duri...
Trendmicro Control Manager 7.0
Trendmicro Endpoint Sensor 1.6
Trendmicro Im Security 1.6.5
Trendmicro Mobile Security 9.8
Trendmicro Officescan Xg
Trendmicro Scanmail 14.0
Trendmicro Security 2019
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect 6.0
7.8
CVSSv2
CVE-2006-6458
The Trend Micro scan engine prior to 8.320 for Windows and prior to 8.150 on HP-UX and AIX, as used in Trend Micro PC Cillin - Internet Security 2006, Office Scan 7.3, and Server Protect 5.58, allows remote malicious users to cause a denial of service (CPU consumption and system ...
Trend Micro Serverprotect 5.58
Trend Micro Officescan 7.3
Trend Micro Pc Cillin - Internet Security 2006
5.1
CVSSv2
CVE-2006-0642
Trend Micro ServerProtect 5.58, and possibly InterScan Messaging Security Suite and InterScan Web Security Suite, have a default configuration setting of "Do not scan compressed files when Extracted file count exceeds 500 files," which may be too low in certain circumst...
Trend Micro Interscan Web Security Suite
Trend Micro Serverprotect 5.58
Trend Micro Interscan Messaging Security Suite
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »