Lucene search

K
TrendmicroServerprotect5.8

7 matches found

CVE
CVE
added 2021/09/29 11:15 a.m.117 views

CVE-2021-36745

A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.

10CVSS9.4AI score0.18719EPSS
CVE
CVE
added 2022/02/24 3:15 a.m.94 views

CVE-2022-25329

Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perform authenticated ac...

9.8CVSS9.5AI score0.01953EPSS
CVE
CVE
added 2022/02/24 3:15 a.m.83 views

CVE-2022-25331

Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote attacker to crash the process.

7.5CVSS7.4AI score0.00805EPSS
CVE
CVE
added 2020/02/20 11:15 p.m.82 views

CVE-2019-14688

Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial produ...

7CVSS6.9AI score0.00409EPSS
CVE
CVE
added 2022/02/24 3:15 a.m.80 views

CVE-2022-25330

Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote attacker to crash the process or achieve remote code execution.

9.8CVSS9.7AI score0.03678EPSS
CVE
CVE
added 2021/03/03 4:15 p.m.46 views

CVE-2021-25252

Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.

5.5CVSS5.4AI score0.00063EPSS
CVE
CVE
added 2020/08/05 2:15 p.m.32 views

CVE-2020-8607

An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potenti...

7.2CVSS6.6AI score0.00082EPSS