Lucene search

K
TrendmicroServerprotect

4 matches found

CVE
CVE
added 2020/02/20 11:15 p.m.82 views

CVE-2019-14688

Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial produ...

7CVSS6.9AI score0.00409EPSS
CVE
CVE
added 2020/09/15 8:15 p.m.49 views

CVE-2020-24561

A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.

9.1CVSS9.3AI score0.02364EPSS
CVE
CVE
added 2020/12/01 7:15 p.m.38 views

CVE-2020-28575

A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnera...

6.7CVSS7.1AI score0.00173EPSS
CVE
CVE
added 2020/08/05 2:15 p.m.32 views

CVE-2020-8607

An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potenti...

7.2CVSS6.6AI score0.00082EPSS