Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro internet security vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2018-6232
A buffer overflow privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local malicious user to escalate privileges on vulnerable installations due to a flaw within processing of IOCTL 0x22205C by the tmnciesc.sys driver. An attacker mus...
Trendmicro Antivirus+
Trendmicro Internet Security
Trendmicro Maximum Security
Trendmicro Premium Security
7.2
CVSSv2
CVE-2018-6233
A buffer overflow privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local malicious user to escalate privileges on vulnerable installations due to a flaw within processing of IOCTL 0x222060 by the tmnciesc.sys driver. An attacker mus...
Trendmicro Antivirus+
Trendmicro Internet Security
Trendmicro Maximum Security
Trendmicro Premium Security
7.2
CVSSv2
CVE-2018-6235
An Out-of-Bounds write privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local malicious user to escalate privileges on vulnerable installations due to a flaw within processing of IOCTL 0x222814 by the tmnciesc.sys driver. An attacke...
Trendmicro Antivirus+
Trendmicro Internet Security
Trendmicro Maximum Security
Trendmicro Premium Security
7.2
CVSSv2
CVE-2017-5565
Code injection vulnerability in Trend Micro Maximum Security 11.0 (and previous versions), Internet Security 11.0 (and previous versions), and Antivirus+ Security 11.0 (and previous versions) allows a local malicious user to bypass a self-protection mechanism, inject arbitrary co...
Trendmicro Premium Security
Trendmicro Antivirus+
Trendmicro Internet Security
Trendmicro Maximum Security
1 Article
7.2
CVSSv2
CVE-2014-9641
The tmeext.sys driver prior to 2.0.0.1015 in Trend Micro Antivirus Plus, Internet Security, and Maximum Security allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x00222400 IOCTL call.
Trendmicro Tmeext.sys
1 EDB exploit
7.2
CVSSv2
CVE-2009-0686
The TrendMicro Activity Monitor Module (tmactmon.sys) 2.52.0.1002 in Trend Micro Internet Pro 2008 and 2009, and Security Pro 2008 and 2009, allows local users to gain privileges via a crafted IRP in a METHOD_NEITHER IOCTL request to \Device\tmactmon that overwrites memory.
Trendmicro Internet Security 2008
Trendmicro Internet Security 2009
1 EDB exploit
7.2
CVSSv2
CVE-2007-0856
TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterpr...
Trend Micro Trend Micro Antispyware 3.2 Sp1
Trend Micro Damage Cleanup Services 3.2
Trend Micro Trend Micro Antispyware 3.0 Sp2
Trend Micro Tmcomm.sys 1.5.1052
Trend Micro Trend Micro Antirootkit Common Module
Trend Micro Pc-cillin Internet Security 2007
Trend Micro Client-server-messaging Security 3.5
Trend Micro Vsapini.sys 3.320.1003
Trend Micro Trend Micro Antivirus 2007
Trend Micro Trend Micro Antispyware 3.5
6.9
CVSSv2
CVE-2020-27695
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a local directory which can lead to obtaining administrative privileges during the installation of the product.
Trendmicro Antivirus+ Security 2020
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
6.9
CVSSv2
CVE-2020-27696
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a specific Windows system directory which can lead to obtaining administrative privileges during the installation of the product.
Trendmicro Antivirus+ Security 2020
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
6.9
CVSSv2
CVE-2020-27697
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a non-protected location with high privileges (symlink attack) which can lead to obtaining administrative privileges during the installatio...
Trendmicro Antivirus+ Security 2020
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »