Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2017-11394
Proxy command injection vulnerability in Trend Micro OfficeScan 11 and XG (12) allows remote malicious users to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the T parameter within Proxy.php. Formerly ZDI-CAN-4544.
Trendmicro Officescan 11.0
Trendmicro Officescan 12.0
1 EDB exploit
10
CVSSv2
CVE-2017-9034
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows malicious users to write to arbitrary files and consequently execute arbitrary code with root privileges by leveraging failure to validate software updates.
Trendmicro Serverprotect 3.0
10
CVSSv2
CVE-2016-7552
On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated malicious user to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.
Trendmicro Threat Discovery Appliance 2.6.1062
2 Metasploit modules
10
CVSSv2
CVE-2016-3987
The HTTP server in Trend Micro Password Manager allows remote web servers to execute arbitrary commands via the url parameter to (1) api/openUrlInDefaultBrowser or (2) api/showSB.
Trendmicro Password Manager -
1 EDB exploit
10
CVSSv2
CVE-2007-1070
Multiple stack-based buffer overflows in Trend Micro ServerProtect for Windows and EMC 5.58, and for Network Appliance Filer 5.61 and 5.62, allow remote malicious users to execute arbitrary code via crafted RPC requests to TmRpcSrv.dll that trigger overflows when calling the (1) ...
Trend Micro Serverprotect 5.58
Trend Micro Serverprotect 5.58
Trend Micro Serverprotect 5.61
Trend Micro Serverprotect 5.62
2 EDB exploits
9.4
CVSSv2
CVE-2020-8470
Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) server contains a vulnerable service DLL file that could allow an malicious user to delete any file on the server with SYSTEM level privileges. Authentication is not required to exploit t...
Trendmicro Apex One 2019
Trendmicro Officescan Xg
Trendmicro Worry-free Business Security 9.0
Trendmicro Worry-free Business Security 9.5
Trendmicro Worry-free Business Security 10.0
9.3
CVSSv2
CVE-2022-26337
Trend Micro Password Manager (Consumer) installer version 5.0.0.1262 and below is vulnerable to an Uncontrolled Search Path Element vulnerability that could allow an malicious user to use a specially crafted file to exploit the vulnerability and escalate local privileges on the a...
Trendmicro Password Manager
9.3
CVSSv2
CVE-2019-14684
A DLL hijacking vulnerability exists in Trend Micro Password Manager 5.0 in which, if exploited, would allow an malicious user to load an arbitrary unsigned DLL into the signed service's process. This process is very similar, yet not identical to CVE-2019-14687.
Trendmicro Password Manager 5.0
9.3
CVSSv2
CVE-2018-6221
An unvalidated software update vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow a man-in-the-middle malicious user to tamper with an update file and inject their own.
Trendmicro Email Encryption Gateway 5.5
1 EDB exploit
9.3
CVSSv2
CVE-2017-6798
Trend Micro Endpoint Sensor 1.6 before b1290 has a DLL hijacking vulnerability that allows remote malicious users to execute arbitrary code, aka Trend Micro Vulnerability Identifier 2015-0208.
Trendmicro Endpoint Sensor
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »