Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2021-36745
A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote malicious user to bypass authentication on affected i...
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect 6.0
10
CVSSv2
CVE-2020-8465
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an malicious user to manipulate system updates using a combination of CSRF bypass (CVE-2020-8461) and authentication bypass (CVE-2020-8464) to execute code as user root.
Trendmicro Interscan Web Security Virtual Appliance 6.5
10
CVSSv2
CVE-2020-8598
Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) server contains a vulnerable service DLL file that could allow a remote malicious user to execute arbitrary code on affected installations with SYSTEM level privileges. Authentication is ...
Trendmicro Apex One 2019
Trendmicro Officescan Xg
Trendmicro Worry-free Business Security 9.0
Trendmicro Worry-free Business Security 9.5
Trendmicro Worry-free Business Security 10.0
10
CVSSv2
CVE-2020-8599
Trend Micro Apex One (2019) and OfficeScan XG server contain a vulnerable EXE file that could allow a remote malicious user to write arbitrary data to an arbitrary path on affected installations and bypass ROOT login. Authentication is not required to exploit this vulnerability.
Trendmicro Officescan Xg
Trendmicro Apex One 2019
10
CVSSv2
CVE-2019-18189
A directory traversal vulnerability in Trend Micro Apex One, OfficeScan (11.0, XG) and Worry-Free Business Security (9.5, 10.0) may allow an malicious user to bypass authentication and log on to an affected product's management console as a root user. The vulnerability does ...
Trendmicro Apex One
Trendmicro Worry-free Business Security 10.0
Trendmicro Officescan 11.0
Trendmicro Officescan Xg
Trendmicro Worry-free Business Security 9.5
10
CVSSv2
CVE-2018-3608
A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an malicious user to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be ...
Trendmicro Maximum Security
Trendmicro Antivirus \\+ Security
Trendmicro Internet Security
Trendmicro Premium Security
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
Trendmicro Officescan Monthly 12.0
Trendmicro Officescan Monthly 11.0
1 Github repository
10
CVSSv2
CVE-2018-6228
A SQL injection vulnerability in a Trend Micro Email Encryption Gateway 5.5 policy script could allow an malicious user to execute SQL commands to upload and execute arbitrary code that may harm the target system.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
10
CVSSv2
CVE-2018-6229
A SQL injection vulnerability in an Trend Micro Email Encryption Gateway 5.5 edit policy script could allow an malicious user to execute SQL commands to upload and execute arbitrary code that may harm the target system.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
10
CVSSv2
CVE-2017-14078
SQL Injection vulnerabilities in Trend Micro Mobile Security (Enterprise) versions prior to 9.7 Patch 3 allow remote malicious users to execute arbitrary code on vulnerable installations.
Trendmicro Mobile Security 9.7
10
CVSSv2
CVE-2017-11393
Proxy command injection vulnerability in Trend Micro OfficeScan 11 and XG (12) allows remote malicious users to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the tr parameter within Proxy.php. Formerly ZDI-CAN-4543.
Trendmicro Officescan 11.0
Trendmicro Officescan 12.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-38028
CVE-2024-32406
CVE-2024-25624
IMAP
CVE-2024-2310
CVE-2024-0874
CVE-2024-20359
XXE
remote code execution
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »