Trend Micro

Serverprotect

25 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 14.8%
  • Veröffentlicht 17.11.2008 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CV...

  • EPSS 14.8%
  • Veröffentlicht 17.11.2008 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CV...

  • EPSS 14.8%
  • Veröffentlicht 17.11.2008 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CV...

  • EPSS 29.46%
  • Veröffentlicht 17.11.2008 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a folder read operation over RPC.

  • EPSS 29.46%
  • Veröffentlicht 17.11.2008 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a file read operation over RPC.

  • EPSS 29.46%
  • Veröffentlicht 17.11.2008 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a read operation over RPC.

  • EPSS 25.62%
  • Veröffentlicht 17.11.2008 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, probably related to an RPC interface.

  • EPSS 18.32%
  • Veröffentlicht 17.11.2008 23:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Unspecified vulnerability in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via vectors related to obtaining "administrative access to the RPC interface."

  • EPSS 71.36%
  • Veröffentlicht 20.12.2007 23:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

SpntSvc.exe daemon in Trend Micro ServerProtect 5.58 for Windows, before Security Patch 4, exposes unspecified dangerous sub-functions from StRpcSrv.dll in the DCE/RPC interface, which allows remote attackers to obtain "full file system access" and e...

  • EPSS 35.61%
  • Veröffentlicht 12.09.2007 01:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Stack-based buffer overflow in the TMregChange function in TMReg.dll in Trend Micro ServerProtect before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 5005.