cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-25226,https://securityvulnerability.io/vulnerability/CVE-2021-25226,Memory Exhaustion Vulnerability in Trend Micro ServerProtect for Linux,"A memory exhaustion vulnerability exists in Trend Micro ServerProtect for Linux 3.0, allowing a local attacker to create specially crafted files that can result in a denial of service. This issue resides within the scan engine component, and exploitation requires the attacker to execute low-privileged code on the compromised system. Successful exploitation could lead to system instability and disruption of service.",Trend Micro,Trend Micro Serverprotect For Linux,5.5,MEDIUM,0.0009200000204145908,false,,false,false,false,,,false,false,,2021-01-27T19:10:25.000Z,0 CVE-2021-25224,https://securityvulnerability.io/vulnerability/CVE-2021-25224,Memory Exhaustion Vulnerability in Trend Micro ServerProtect for Linux,"A memory exhaustion issue exists within Trend Micro ServerProtect for Linux 3.0, originating from its manual scan component. This vulnerability allows a local attacker to create specific files aimed at exhausting system memory, potentially resulting in a denial-of-service scenario. To successfully exploit this flaw, an attacker must first execute low-privileged code on the target machine. Effective mitigation strategies should be employed to safeguard the affected systems.",Trend Micro,Trend Micro Serverprotect For Linux,5.5,MEDIUM,0.0009200000204145908,false,,false,false,false,,,false,false,,2021-01-27T19:10:24.000Z,0 CVE-2021-25225,https://securityvulnerability.io/vulnerability/CVE-2021-25225,Memory Exhaustion Vulnerability in Trend Micro ServerProtect for Linux,"A memory exhaustion vulnerability exists in Trend Micro ServerProtect for Linux 3.0, which could be exploited by a local attacker through the creation of specific files. This flaw resides within a scheduled scan component of the software, which, when manipulated, can lead to a denial-of-service scenario. To exploit this vulnerability, the attacker must gain the ability to execute low-privileged code on the compromised system.",Trend Micro,Trend Micro Serverprotect For Linux,5.5,MEDIUM,0.0009200000204145908,false,,false,false,false,,,false,false,,2021-01-27T19:10:24.000Z,0 CVE-2020-28575,https://securityvulnerability.io/vulnerability/CVE-2020-28575,Heap-Based Buffer Overflow in Trend Micro ServerProtect for Linux,"A heap-based buffer overflow vulnerability in Trend Micro ServerProtect for Linux 3.0 allows attackers to escalate privileges on vulnerable systems. To exploit this vulnerability, an attacker must first execute code with elevated privileges on the affected installation. This could lead to unauthorized access and control over the system, making it essential for users to address this security concern promptly.",Trend Micro,Trend Micro Serverprotect For Linux,6.7,MEDIUM,0.0009899999713525176,false,,false,false,false,,,false,false,,2020-12-01T18:40:38.000Z,0 CVE-2020-24561,https://securityvulnerability.io/vulnerability/CVE-2020-24561,Command Injection Vulnerability in Trend Micro ServerProtect for Linux,"A command injection vulnerability has been identified in Trend Micro ServerProtect for Linux version 3.0. This flaw allows an attacker to exploit the system by executing arbitrary commands. To successfully exploit this vulnerability, the attacker must first gain admin or root privileges on the SPLX console, thereby increasing the risk and potential impact on the affected systems.",Trend Micro,Trend Micro Serverprotect For Linux,9.1,CRITICAL,0.0013000000035390258,false,,false,false,false,,,false,false,,2020-09-15T20:00:16.000Z,0