
CVE-2021-25224 – Trend Micro ServerProtect splx_manual_scan Memory Exhaustion Denial-Of-Service Vulnerability
https://notcve.org/view.php?id=CVE-2021-25224
27 Jan 2021 — A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de agotamiento de la memoria en Trend Micro ServerProtect para Linux versión 3.0, podría permitir a un atacante ... • https://success.trendmicro.com/solution/000284207 • CWE-400: Uncontrolled Resource Consumption •

CVE-2021-25225 – Trend Micro ServerProtect splx_schedule_scan Memory Exhaustion Denial-Of-Service Vulnerability
https://notcve.org/view.php?id=CVE-2021-25225
27 Jan 2021 — A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de agotamiento de la memoria en Trend Micro ServerProtect para Linux versión 3.0, podría permitir a un atacan... • https://success.trendmicro.com/solution/000284207 • CWE-400: Uncontrolled Resource Consumption •

CVE-2021-25226 – Trend Micro ServerProtect vsapiapp Memory Exhaustion Denial-Of-Service Vulnerability
https://notcve.org/view.php?id=CVE-2021-25226
27 Jan 2021 — A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scan engine component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de agotamiento de la memoria en Trend Micro ServerProtect para Linux versión 3.0, podría permitir a un atacante ... • https://success.trendmicro.com/solution/000284207 • CWE-400: Uncontrolled Resource Consumption •

CVE-2020-28575 – Trend Micro ServerProtect ioctlMod Heap-based Buffer Overflow Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2020-28575
24 Nov 2020 — A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnerability. Una vulnerabilidad de escalada de privilegios de desbordamiento de búfer en la región heap de la memoria en Trend Micro ServerProtect para Linux versión 3.0, puede permitir a un atacante escalar privilegio... • https://success.trendmicro.com/solution/000281950 • CWE-787: Out-of-bounds Write •

CVE-2020-24561
https://notcve.org/view.php?id=CVE-2020-24561
15 Sep 2020 — A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability. Una vulnerabilidad de inyección de comandos en Trend Micro ServerProtect para Linux versión 3.0, podría permitir a un atacante ejecutar código arbitrario en un sistema afectado. Un atacante debe primero obtener privilegios admin/root en la consola SPLX p... • https://success.trendmicro.com/solution/000268419 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2020-8607
https://notcve.org/view.php?id=CVE-2020-8607
05 Aug 2020 — An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.... • https://jvn.jp/en/vu/JVNVU99160193/index.html • CWE-20: Improper Input Validation •

CVE-2017-9032 – Trend Micro ServerProtect Disclosure / CSRF / XSS
https://notcve.org/view.php?id=CVE-2017-9032
24 May 2017 — Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) T1 or (2) tmLastConfigFileModifiedDate parameter to log_management.cgi. Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en ServerProtect de Trend Micro para Linux versión 3.0 anterior a CP 1531, permiten a atacantes remotos inyectar script web o HTML arbitrario por medio del parámetro (1) T1 o (2) tmLastConfigFil... • https://packetstorm.news/files/id/142645 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2017-9033 – Trend Micro ServerProtect Disclosure / CSRF / XSS
https://notcve.org/view.php?id=CVE-2017-9033
24 May 2017 — Cross-site request forgery (CSRF) vulnerability in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows remote attackers to hijack the authentication of users for requests to start an update from an arbitrary source via a crafted request to SProtectLinux/scanoption_set.cgi, related to the lack of anti-CSRF tokens. Una vulnerabilidad de tipo cross-site request forgery (CSRF) en ServerProtect de Trend Micro para Linux versión 3.0 anterior a CP 1531, permite a los atacantes remotos secuestrar la auten... • https://packetstorm.news/files/id/142645 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2017-9034 – Trend Micro ServerProtect Disclosure / CSRF / XSS
https://notcve.org/view.php?id=CVE-2017-9034
24 May 2017 — Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows attackers to write to arbitrary files and consequently execute arbitrary code with root privileges by leveraging failure to validate software updates. ServerProtect de Trend Micro para Linux versión 3.0 anterior a CP 1531 permite a los atacantes escribir en archivos arbitrarios y en consecuencia, ejecutar código arbitrario con privilegios de root mediante el aprovechamiento del fallo para comprobar las actualizaciones del programa. Trend Micro Se... • https://packetstorm.news/files/id/142645 • CWE-20: Improper Input Validation •

CVE-2017-9035 – Trend Micro ServerProtect Disclosure / CSRF / XSS
https://notcve.org/view.php?id=CVE-2017-9035
24 May 2017 — Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows attackers to eavesdrop and tamper with updates by leveraging unencrypted communications with update servers. Trend Micro ServerProtect para Linux 3.0 en versiones anteriores a la CP 1531 permite a los atacantes escuchar y manipular actualizaciones, aprovechando comunicaciones sin cifrar con servidores de actualización. Trend Micro ServerProtect suffers from information disclosure, manipulation, cross site request forgery, cross site scripting, an... • https://packetstorm.news/files/id/142645 • CWE-319: Cleartext Transmission of Sensitive Information •