![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-4731 – Trend Micro ServerProtect TMregChange() Stack Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2007-4731
07 Sep 2007 — Stack-based buffer overflow in the TMregChange function in TMReg.dll in Trend Micro ServerProtect before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 5005. Desbordamiento de búfer basado en pila en la función TMregChange de TMReg.dll de Trend Micro SErverProtect anterir a 5.58 Security Patch 4 permite a atacantes remotos ejecutar código de su elección mediante un paquete manipulado al puerto TCP 5005. This vulnerability allows remote attackers to e... • http://osvdb.org/45878 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-2508 – Trend Micro ServerProtect AgRpcCln.dll Stack Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2007-2508
07 May 2007 — Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote attackers to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the AgRpcCln.dll library in SpntSvc.exe; or (2) TCP port 3628, which triggers an overflow in EarthAgent.exe. NOTE: both issues are reachable via TmRpcSrv.dll. Múltiples desbordamientos de búfer en la región?? stack de la memoria en Trend Micro... • https://www.exploit-db.com/exploits/16828 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-1168
https://notcve.org/view.php?id=CVE-2007-1168
28 Feb 2007 — Trend Micro ServerProtect for Linux (SPLX) 1.25, 1.3, and 2.5 before 20070216 allows remote attackers to access arbitrary web pages and reconfigure the product via HTTP requests with the splx_2376_info cookie to the web interface port (14942/tcp). Trend Micro ServerProtect para Linux (SPLX) 1.25, 1.3, y 2.5 anterior a 20070216 permite a atacantes remotos acceder a páginas web de su elección y recofigurar el producto a través de respuesta HTTP con la cookie splx_2376_info en el puerto de interfaz web (14942/... • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=477 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-1929
https://notcve.org/view.php?id=CVE-2005-1929
14 Dec 2005 — Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and earlier, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote attackers to execute arbitrary code via "wrapped" length values in Chunked transfer requests. NOTE: the original report suggests that the relay.dll issue is related to a problem in which a Microsoft Foundation Classes (MFC) static library returns invalid values under heavy load. As ... • http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039972.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0533
https://notcve.org/view.php?id=CVE-2005-0533
24 Feb 2005 — Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure. • http://secunia.com/advisories/14396 •