Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro officescan 11.0 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2019-18189
A directory traversal vulnerability in Trend Micro Apex One, OfficeScan (11.0, XG) and Worry-Free Business Security (9.5, 10.0) may allow an malicious user to bypass authentication and log on to an affected product's management console as a root user. The vulnerability does ...
Trendmicro Officescan 11.0
Trendmicro Officescan Xg
Trendmicro Apex One
Trendmicro Worry-free Business Security 9.5
Trendmicro Worry-free Business Security 10.0
9.8
CVSSv3
CVE-2018-3608
A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an malicious user to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be ...
Trendmicro Antivirus + Security
Trendmicro Internet Security
Trendmicro Maximum Security
Trendmicro Premium Security
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
Trendmicro Officescan Monthly 12.0
Trendmicro Officescan Monthly 11.0
1 Github repository
9.8
CVSSv3
CVE-2017-14089
An Unauthorized Memory Corruption vulnerability in Trend Micro OfficeScan 11.0 and XG may allow remote unauthenticated users who can access the OfficeScan server to target cgiShowClientAdm.exe and cause memory corruption issues.
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
1 EDB exploit
9.8
CVSSv3
CVE-2017-11393
Proxy command injection vulnerability in Trend Micro OfficeScan 11 and XG (12) allows remote malicious users to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the tr parameter within Proxy.php. Formerly ZDI-CAN-4543.
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
9.8
CVSSv3
CVE-2017-11394
Proxy command injection vulnerability in Trend Micro OfficeScan 11 and XG (12) allows remote malicious users to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the T parameter within Proxy.php. Formerly ZDI-CAN-4544.
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
1 EDB exploit
8.8
CVSSv3
CVE-2018-10508
A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a malicious user to use a specially crafted URL to elevate account permissions on vulnerable installations. An attacker must already have at least guest privileges in order to exploit this vulnerability.
Trendmicro Officescan 11.0
Trendmicro Officescan Xg
8.8
CVSSv3
CVE-2018-10509
A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a malicious user to exploit it via a Browser Refresh attack on vulnerable installations. An attacker must be using a AD logon user account in order to exploit this vulnerability.
Trendmicro Officescan 11.0
Trendmicro Officescan Xg
8.8
CVSSv3
CVE-2017-5481
Trend Micro OfficeScan 11.0 before SP1 CP 6325 and XG before CP 1352 allows remote authenticated users to gain privileges by leveraging a leak of an encrypted password during a web-console operation.
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
8.1
CVSSv3
CVE-2017-14084
A potential Man-in-the-Middle (MitM) attack vulnerability in Trend Micro OfficeScan 11.0 and XG may allow malicious users to execute arbitrary code on vulnerable installations.
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
1 EDB exploit
7.8
CVSSv3
CVE-2019-9492
A DLL side-loading vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow an authenticated malicious user to gain code execution and terminate the product's process - disabling endpoint protection. The attacker must have already gained authentication and have lo...
Trendmicro Officescan 11.0
Trendmicro Officescan Xg
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »