Trend Micro ServerProtect 5.8 for Netware

CPE Details

Trend Micro ServerProtect 5.8 for Netware
5.8
2020-04-03
09h28 +00:00
2020-04-03
09h28 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*

Informations

Vendor

trendmicro

Product

serverprotect

Version

5.8

Target Software

netware

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-25331 2022-02-24 01h45 +00:00 Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote attacker to crash the process.
7.5
Haute
CVE-2022-25330 2022-02-24 01h45 +00:00 Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote attacker to crash the process or achieve remote code execution.
9.8
Critique
CVE-2022-25329 2022-02-24 01h45 +00:00 Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perform authenticated actions.
9.8
Critique
CVE-2021-36745 2021-09-29 08h21 +00:00 A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.
9.8
Critique
CVE-2020-8607 2020-08-05 12h05 +00:00 An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
6.7
Moyen
CVE-2019-14688 2020-02-20 21h50 +00:00 Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial product installation by an authorized user. The attacker must convince the target to download malicious DLL locally which must be present when the installer is run.
7
Haute