cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-25331,https://securityvulnerability.io/vulnerability/CVE-2022-25331,Uncaught Exception Vulnerability in Trend Micro ServerProtection,"An uncaught exceptions vulnerability exists in Trend Micro ServerProtection 6.0 and 5.8 Information Server, which could allow a remote attacker to exploit the flaw. This exploitation has the potential to crash the server process, disrupting services and compromising system availability. Proper security measures and updates are essential to mitigate this risk and ensure system stability.",Trend Micro,"Trend Micro Serverprotect For Storage,Trend Micro Serverprotect For Microsoft Windows / Novell Netware,Trend Micro Serverprotect For Emc Celerra,Trend Micro Serverprotect For Network Appliance Filers",7.5,HIGH,0.0018100000452250242,false,,false,false,false,,,false,false,,2022-02-24T02:45:24.000Z,0 CVE-2022-25330,https://securityvulnerability.io/vulnerability/CVE-2022-25330,Integer Overflow Vulnerability in Trend Micro ServerProtect,"An integer overflow vulnerability exists in Trend Micro ServerProtect versions 6.0 and 5.8 Information Server. This flaw can be exploited by remote attackers to crash the affected process or execute arbitrary code. The exploitation could lead to serious security breaches, emphasizing the importance of immediate patching to mitigate potential risks.",Trend Micro,"Trend Micro Serverprotect For Storage,Trend Micro Serverprotect For Microsoft Windows / Novell Netware,Trend Micro Serverprotect For Emc Celerra,Trend Micro Serverprotect For Network Appliance Filers",9.8,CRITICAL,0.006850000005215406,false,,false,false,false,,,false,false,,2022-02-24T02:45:22.000Z,0 CVE-2022-25329,https://securityvulnerability.io/vulnerability/CVE-2022-25329,Authentication Bypass in Trend Micro ServerProtect Information Server,"Trend Micro ServerProtect versions 6.0 and 5.8 contain a vulnerability that allows unauthenticated remote attackers to exploit the Information Server. By using a specific command in the console, an attacker could register on the server and execute actions as an authenticated user. This flaw stems from the use of static credentials during the authentication process, posing a significant security risk for organizations relying on these versions.",Trend Micro,"Trend Micro Serverprotect For Storage,Trend Micro Serverprotect For Microsoft Windows / Novell Netware,Trend Micro Serverprotect For Emc Celerra,Trend Micro Serverprotect For Network Appliance Filers",9.8,CRITICAL,0.00343000004068017,false,,false,false,false,,,false,false,,2022-02-24T02:45:21.000Z,0 CVE-2021-36745,https://securityvulnerability.io/vulnerability/CVE-2021-36745,Authentication Bypass Vulnerability in Trend Micro ServerProtect Products,"A vulnerability exists in multiple versions of Trend Micro ServerProtect products, enabling remote attackers to bypass authentication mechanisms on affected installations. This flaw could lead directly to unauthorized access, posing significant security risks to systems relying on these products. Proper security measures should be evaluated to mitigate potential exploitation.",Trend Micro,"Trend Micro Serverprotect For Storage,Trend Micro Serverprotect For Emc Celerra,Trend Micro Serverprotect For Network Appliance Filers,Trend Micro Serverprotect For Microsoft Windows / Novell Netware",9.8,CRITICAL,0.01858000084757805,false,,false,false,false,,,false,false,,2021-09-29T10:21:30.000Z,0