Описание
A vulnerability in Trend Micro Smart Protection Server (Standalone) 3.x could allow an unauthenticated remote attacker to manipulate the product to send a large number of specially crafted HTTP requests to potentially cause the file system to fill up, eventually causing a denial of service (DoS) situation.
Ссылки
- Vendor Advisory
- ExploitThird Party Advisory
- Vendor Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
Одно из
cpe:2.3:a:trendmicro:smart_protection_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:smart_protection_server:3.1:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:smart_protection_server:3.2:*:*:*:*:*:*:*
cpe:2.3:a:trendmicro:smart_protection_server:3.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.0654
Низкий
7.5 High
CVSS3
7.8 High
CVSS2
Дефекты
CWE-400
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
A vulnerability in Trend Micro Smart Protection Server (Standalone) 3.x could allow an unauthenticated remote attacker to manipulate the product to send a large number of specially crafted HTTP requests to potentially cause the file system to fill up, eventually causing a denial of service (DoS) situation.
EPSS
Процентиль: 91%
0.0654
Низкий
7.5 High
CVSS3
7.8 High
CVSS2
Дефекты
CWE-400