Trend Micro

Serverprotect

25 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.94%
  • Veröffentlicht 11.12.2006 17:28:00
  • Zuletzt bearbeitet 23.04.2026 00:35:47

The Trend Micro scan engine before 8.320 for Windows and before 8.150 on HP-UX and AIX, as used in Trend Micro PC Cillin - Internet Security 2006, Office Scan 7.3, and Server Protect 5.58, allows remote attackers to cause a denial of service (CPU con...

  • EPSS 0.84%
  • Veröffentlicht 10.02.2006 11:02:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Trend Micro ServerProtect 5.58, and possibly InterScan Messaging Security Suite and InterScan Web Security Suite, have a default configuration setting of "Do not scan compressed files when Extracted file count exceeds 500 files," which may be too low...

  • EPSS 4.75%
  • Veröffentlicht 14.12.2005 21:03:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and earlier, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote attackers to execute ...

  • EPSS 0.87%
  • Veröffentlicht 14.12.2005 20:07:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Directory traversal vulnerability in the Crystal Report component (rptserver.asp) in Trend Micro ServerProtect Management Console 5.58, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, and possibly earlier versions, allows remote...

  • EPSS 6.97%
  • Veröffentlicht 02.05.2005 04:00:00
  • Zuletzt bearbeitet 16.04.2026 00:27:16

Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within...