Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
serverprotect vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2006-5268
Unspecified vulnerability in Trend Micro ServerProtect 5.7 and 5.58 allows remote malicious users to execute arbitrary code via vectors related to obtaining "administrative access to the RPC interface."
Trend Micro Serverprotect 5.7
Trend Micro Serverprotect 5.58
5
CVSSv2
CVE-2022-25331
Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote malicious user to crash the process.
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect For Network Appliance Filer 5.8
Trendmicro Serverprotect For Storage 6.0
7.5
CVSSv2
CVE-2022-25329
Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perfo...
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect For Network Appliance Filer 5.8
Trendmicro Serverprotect For Storage 6.0
7.5
CVSSv2
CVE-2022-25330
Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote malicious user to crash the process or achieve remote code execution.
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect For Network Appliance Filer 5.8
Trendmicro Serverprotect For Storage 6.0
10
CVSSv2
CVE-2007-2508
Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote malicious users to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the A...
Trend Micro Serverprotect
3 EDB exploits
7.5
CVSSv2
CVE-2005-1929
Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and previous versions, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote malicious users to execute arbitrary code...
Trend Micro Serverprotect
4.6
CVSSv2
CVE-2020-28575
A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an malicious user to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in orde...
Trendmicro Serverprotect 3.0
9
CVSSv2
CVE-2020-24561
A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an malicious user to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.
Trendmicro Serverprotect 3.0
2.1
CVSSv2
CVE-2021-25224
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local malicious user to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obta...
Trendmicro Serverprotect 3.0
2.1
CVSSv2
CVE-2021-25225
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local malicious user to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first o...
Trendmicro Serverprotect 3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4651
CVE-2024-34255
elevation of privilege
CVE-2024-25529
CVE-2024-4671
NULL pointer dereference
CVE-2024-25527
template injection
CVE-2008-0166
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »