Vulnerabilities > Trend Micro > Serverprotect > Medium

DATE CVE VULNERABILITY TITLE RISK
2007-03-02 CVE-2007-1169 Remote Security vulnerability in Trend Micro Serverprotect 1.2520070216
The web interface in Trend Micro ServerProtect for Linux (SPLX) 1.25, 1.3, and 2.5 before 20070216 accepts logon requests through unencrypted HTTP, which might allow remote attackers to obtain credentials by sniffing the network.
network
low complexity
trend-micro
5.0
2006-02-10 CVE-2006-0642 Unspecified vulnerability in Trend Micro products
Trend Micro ServerProtect 5.58, and possibly InterScan Messaging Security Suite and InterScan Web Security Suite, have a default configuration setting of "Do not scan compressed files when Extracted file count exceeds 500 files," which may be too low in certain circumstances, which allows remote attackers to bypass anti-virus checks by sending compressed archives containing many small files.
network
high complexity
trend-micro
5.1
2005-12-14 CVE-2005-1930 Directory Traversal vulnerability in Trend Micro Serverprotect 5.58
Directory traversal vulnerability in the Crystal Report component (rptserver.asp) in Trend Micro ServerProtect Management Console 5.58, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, and possibly earlier versions, allows remote attackers to read arbitrary files via the IMAGE parameter.
network
low complexity
trend-micro
5.0