Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro officescan 12.0 vulnerabilities and exploits
(subscribe to this query)
6.1
CVSSv3
CVE-2017-8801
Trend Micro OfficeScan 11.0 before SP1 CP 6325 (with Agent Module Build prior to 6152) and XG before CP 1352 has XSS via a crafted URI using a blocked website.
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
7
CVSSv3
CVE-2017-14088
Memory Corruption Privilege Escalation vulnerabilities in Trend Micro OfficeScan 11.0 and XG allows local malicious users to execute arbitrary code and escalate privileges to resources normally reserved for the kernel on vulnerable installations by exploiting tmwfp.sys. An attack...
Trendmicro Officescan Xg 12.0
Trendmicro Officescan 11.0
7
CVSSv3
CVE-2018-6218
A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an malicious user to run arbitrary code on a vulnerable system.
Trendmicro Deep Security 10.0
Trendmicro Deep Security 10.1
Trendmicro Endpoint Sensor 1.6
Trendmicro Officescan 11.0
Trendmicro Officescan 12.0
Trendmicro Security 12.0
Trendmicro Worry-free Business Security 9.5
4.7
CVSSv3
CVE-2018-15364
A Named Pipe Request Processing Out-of-Bounds Read Information Disclosure vulnerability in Trend Micro OfficeScan XG (12.0) could allow a local malicious user to disclose sensitive information on vulnerable installations. An attacker must first obtain the ability to execute low-p...
Trendmicro Officescan Xg 12.0
7.5
CVSSv3
CVE-2019-18187
Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE...
Trendmicro Officescan Xg
Trendmicro Officescan 11.0
6.7
CVSSv3
CVE-2020-8607
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a syst...
Trendmicro Antivirus Toolkit
Trendmicro Apex One 2019
Trendmicro Apex One Saas
Trendmicro Deep Security 9.6
Trendmicro Deep Security 10.0
Trendmicro Deep Security 11.0
Trendmicro Deep Security 12.0
Trendmicro Officescan Xg
Trendmicro Officescan Business Security 9.0
Trendmicro Officescan Business Security 9.5
Trendmicro Officescan Business Security 10.0
Trendmicro Officescan Business Security Service -
Trendmicro Officescan Cloud 15
Trendmicro Officescan Cloud 16.0
Trendmicro Online Scan 8.0
Trendmicro Portable Security 2.0
Trendmicro Portable Security 3.0
Trendmicro Rootkit Buster 2.2
Trendmicro Safe Lock -
Trendmicro Safe Lock 2.0
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect 6.0
5.5
CVSSv3
CVE-2021-25252
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.
Trendmicro Apex Central 2019
Trendmicro Apex One 2019
Trendmicro Cloud Edge 5.0
Trendmicro Apex One -
Trendmicro Deep Security 10.0
Trendmicro Deep Security 11.0
Trendmicro Deep Security 12.0
Trendmicro Deep Security 20.0
Trendmicro Control Manager 7.0
Trendmicro Deep Discovery Analyzer 5.1
Trendmicro Deep Discovery Email Inspector 2.5
Trendmicro Deep Discovery Inspector 3.8
Trendmicro Interscan Messaging Security Virtual Appliance 9.1
Trendmicro Interscan Web Security Virtual Appliance 6.5
Trendmicro Officescan -
Trendmicro Portal Protect 2.6
Trendmicro Scanmail 14.0
Trendmicro Scanmail For Ibm Domino 5.8
Trendmicro Serverprotect For Storage 6.0
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect For Network Appliance Filers 5.8
Trendmicro Safe Lock 1.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2