Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro officescan - vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2018-3608
A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an malicious user to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be ...
Trendmicro Maximum Security
Trendmicro Antivirus \\+ Security
Trendmicro Internet Security
Trendmicro Premium Security
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
Trendmicro Officescan Monthly 12.0
Trendmicro Officescan Monthly 11.0
1 Github repository
6.3
CVSSv3
CVE-2018-10359
A pool corruption privilege escalation vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a local malicious user to escalate privileges on vulnerable installations due to a flaw within the processing of IOCTL 0x220078 in the TMWFP driver. An attacker must first o...
Trendmicro Officescan 11.0
Trendmicro Officescan Xg
5.3
CVSSv3
CVE-2017-14085
Information disclosure vulnerabilities in Trend Micro OfficeScan 11.0 and XG may allow unauthenticated users who can access the OfficeScan server to query the network's NT domain or the PHP version and modules.
Trendmicro Officescan 11.0
Trendmicro Officescan 12.0
1 EDB exploit
7.5
CVSSv3
CVE-2017-14086
Pre-authorization Start Remote Process vulnerabilities in Trend Micro OfficeScan 11.0 and XG may allow unauthenticated users who can access the OfficeScan server to start the fcgiOfcDDA.exe executable or cause a potential INI corruption, which may cause the server disk space to b...
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
1 EDB exploit
7.5
CVSSv3
CVE-2017-14087
A Host Header Injection vulnerability in Trend Micro OfficeScan XG (12.0) may allow an malicious user to spoof a particular Host header, allowing the malicious user to render arbitrary links that point to a malicious website with poisoned Host header webpages.
Trendmicro Officescan 11.0
Trendmicro Officescan 12.0
1 EDB exploit
9.8
CVSSv3
CVE-2017-14089
An Unauthorized Memory Corruption vulnerability in Trend Micro OfficeScan 11.0 and XG may allow remote unauthenticated users who can access the OfficeScan server to target cgiShowClientAdm.exe and cause memory corruption issues.
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
1 EDB exploit
6.3
CVSSv3
CVE-2018-10358
A pool corruption privilege escalation vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a local malicious user to escalate privileges on vulnerable installations due to a flaw within the processing of IOCTL 0x2200B4 in the TMWFP driver. An attacker must first o...
Trendmicro Officescan Xg
Trendmicro Officescan 11.0
6.3
CVSSv3
CVE-2018-10505
A pool corruption privilege escalation vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a local malicious user to escalate privileges on vulnerable installations due to a flaw within the processing of IOCTL 0x220008 in the TMWFP driver. An attacker must first o...
Trendmicro Officescan Xg
Trendmicro Officescan 11.0
8.8
CVSSv3
CVE-2018-10508
A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a malicious user to use a specially crafted URL to elevate account permissions on vulnerable installations. An attacker must already have at least guest privileges in order to exploit this vulnerability.
Trendmicro Officescan 11.0
Trendmicro Officescan Xg
8.8
CVSSv3
CVE-2018-10509
A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a malicious user to exploit it via a Browser Refresh attack on vulnerable installations. An attacker must be using a AD logon user account in order to exploit this vulnerability.
Trendmicro Officescan 11.0
Trendmicro Officescan Xg
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »