Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro security vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2024-23940
Trend Micro uiAirSupport, included in the Trend Micro Security 2023 family of consumer products, version 6.0.2092 and below is vulnerable to a DLL hijacking/proxying vulnerability, which if exploited could allow an malicious user to impersonate and modify a library to execute cod...
Trendmicro Air Support
Trendmicro Antivirus + Security
Trendmicro Internet Security
Trendmicro Maximum Security
Trendmicro Premium Security
7.8
CVSSv3
CVE-2023-52090
A security agent link following vulnerability in Trend Micro Apex One could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploi...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-52091
An anti-spyware engine link following vulnerability in Trend Micro Apex One could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to ...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-52092
A security agent link following vulnerability in Trend Micro Apex One could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploi...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-52093
An exposed dangerous function vulnerability in the Trend Micro Apex One agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-52094
An updater link following vulnerability in the Trend Micro Apex One agent could allow a local malicious user to abuse the updater to delete an arbitrary folder, leading for a local privilege escalation on affected installations. Please note: an attacker must first obtain the abil...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-52337
An improper access control vulnerability in Trend Micro Deep Security 20.0 and Trend Micro Cloud One - Endpoint and Workload Security Agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability ...
Trendmicro Deep Security 20.0
Trendmicro Deep Security Agent 20.0
7.8
CVSSv3
CVE-2023-52338
A link following vulnerability in the Trend Micro Deep Security 20.0 and Trend Micro Cloud One - Endpoint and Workload Security Agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to exe...
Trendmicro Deep Security 20.0
Trendmicro Deep Security Agent 20.0
7.8
CVSSv3
CVE-2023-47192
An agent link vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to explo...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-47193
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-38627
CVE-2022-45803
CVE-2024-38319
camera
template injection
CVE-2024-27801
CVE-2024-0762
CVE-2024-5791
unauthorized
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »