Show filters
44 Total Results
Displaying 1-10 of 44
Sort by:
Attacker Value
Unknown
CVE-2022-25331
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote attacker to crash the process.
0
Attacker Value
Unknown
CVE-2022-25330
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote attacker to crash the process or achieve remote code execution.
0
Attacker Value
Unknown
CVE-2022-25329
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perform authenticated actions.
0
Attacker Value
Unknown
CVE-2021-36745
Disclosure Date: September 29, 2021 (last updated February 23, 2025)
A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.
0
Attacker Value
Unknown
CVE-2021-25252
Disclosure Date: March 03, 2021 (last updated February 22, 2025)
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.
0
Attacker Value
Unknown
CVE-2021-25224
Disclosure Date: January 27, 2021 (last updated February 22, 2025)
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2021-25226
Disclosure Date: January 27, 2021 (last updated February 22, 2025)
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scan engine component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2021-25225
Disclosure Date: January 27, 2021 (last updated February 22, 2025)
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2020-28575
Disclosure Date: December 01, 2020 (last updated February 22, 2025)
A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2020-24561
Disclosure Date: September 15, 2020 (last updated February 22, 2025)
A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.
0