- EPSS 14.8%
- Veröffentlicht 17.11.2008 23:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CV...
- EPSS 14.8%
- Veröffentlicht 17.11.2008 23:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CV...
- EPSS 14.8%
- Veröffentlicht 17.11.2008 23:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CV...
- EPSS 29.46%
- Veröffentlicht 17.11.2008 23:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a folder read operation over RPC.
- EPSS 29.46%
- Veröffentlicht 17.11.2008 23:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a file read operation over RPC.
- EPSS 29.46%
- Veröffentlicht 17.11.2008 23:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a read operation over RPC.
- EPSS 25.62%
- Veröffentlicht 17.11.2008 23:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, probably related to an RPC interface.
- EPSS 18.32%
- Veröffentlicht 17.11.2008 23:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Unspecified vulnerability in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via vectors related to obtaining "administrative access to the RPC interface."
- EPSS 71.36%
- Veröffentlicht 20.12.2007 23:46:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
SpntSvc.exe daemon in Trend Micro ServerProtect 5.58 for Windows, before Security Patch 4, exposes unspecified dangerous sub-functions from StRpcSrv.dll in the DCE/RPC interface, which allows remote attackers to obtain "full file system access" and e...
- EPSS 35.61%
- Veröffentlicht 12.09.2007 01:17:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Stack-based buffer overflow in the TMregChange function in TMReg.dll in Trend Micro ServerProtect before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 5005.