cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-25226,https://securityvulnerability.io/vulnerability/CVE-2021-25226,,A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scan engine component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.,Trend Micro,Trend Micro Serverprotect For Linux,5.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2021-01-27T19:10:25.000Z,0 CVE-2021-25224,https://securityvulnerability.io/vulnerability/CVE-2021-25224,,A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.,Trend Micro,Trend Micro Serverprotect For Linux,5.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2021-01-27T19:10:24.000Z,0 CVE-2021-25225,https://securityvulnerability.io/vulnerability/CVE-2021-25225,,A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.,Trend Micro,Trend Micro Serverprotect For Linux,5.5,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2021-01-27T19:10:24.000Z,0 CVE-2020-28575,https://securityvulnerability.io/vulnerability/CVE-2020-28575,,A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnerability.,Trend Micro,Trend Micro Serverprotect For Linux,6.7,MEDIUM,0.0009899999713525176,false,false,false,false,,false,false,2020-12-01T18:40:38.000Z,0 CVE-2020-24561,https://securityvulnerability.io/vulnerability/CVE-2020-24561,,A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.,Trend Micro,Trend Micro Serverprotect For Linux,9.1,CRITICAL,0.0013000000035390258,false,false,false,false,,false,false,2020-09-15T20:00:16.000Z,0