Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro serverprotect 2.5 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2007-1168
Trend Micro ServerProtect for Linux (SPLX) 1.25, 1.3, and 2.5 prior to 20070216 allows remote malicious users to access arbitrary web pages and reconfigure the product via HTTP requests with the splx_2376_info cookie to the web interface port (14942/tcp).
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Serverprotect 1.3
Trend Micro Serverprotect 2.5
668
VMScore
CVE-2005-1929
Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and previous versions, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote malicious users to execute arbitrary code...
Trend Micro Serverprotect
445
VMScore
CVE-2005-1930
Directory traversal vulnerability in the Crystal Report component (rptserver.asp) in Trend Micro ServerProtect Management Console 5.58, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, and possibly earlier versions, allows remote malicious users to read arbit...
Trend Micro Serverprotect 5.58
694
VMScore
CVE-2005-1928
Trend Micro ServerProtect EarthAgent for Windows Management Console 5.58 and possibly earlier versions, when running with Trend Micro Control Manager 2.5 and 3.0, and Damage Cleanup Server 1.1, allows remote malicious users to cause a denial of service (CPU consumption) via a flo...
Trend Micro Serverprotect Earthagent 5.58
445
VMScore
CVE-2007-1169
The web interface in Trend Micro ServerProtect for Linux (SPLX) 1.25, 1.3, and 2.5 prior to 20070216 accepts logon requests through unencrypted HTTP, which might allow remote malicious users to obtain credentials by sniffing the network.
Trend Micro Serverprotect 1.25 2007-02-16
668
VMScore
CVE-2005-0533
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI prior to 7.510, as used in multiple Trend Micro products, allows remote malicious users to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Trend Micro Control Manager Gold
Trend Micro Interscan Emanager 3.5.2
Trend Micro Interscan Emanager 3.6
Trend Micro Interscan Messaging Security Suite 5.5
Trend Micro Interscan Viruswall 3.5
Trend Micro Interscan Viruswall 3.52
Trend Micro Interscan Viruswall 5.1
Trend Micro Interscan Viruswall Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Interscan Webmanager 1.2
Trend Micro Interscan Webmanager 2.1
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 5.58
Trend Micro Pc-cillin 2000
Trend Micro Scanmail 2.51
Trend Micro Scanmail 3.8
Trend Micro Scanmail 6.1
Trend Micro Scanmail Gold
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Client-server Suite Smb Gold
Trend Micro Interscan Messaging Security Suite Gold
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32886
insecure direct object reference
CVE-2024-34342
file inclusion
CVE-2024-34562
CVE-2024-34347
CVE-2024-26026
CVE-2024-4647
unprivileged
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started