Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro vulnerabilities and exploits
(subscribe to this query)
6.9
CVSSv2
CVE-2020-27697
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a non-protected location with high privileges (symlink attack) which can lead to obtaining administrative privileges during the installatio...
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
Trendmicro Antivirus\\+ Security 2020
2.1
CVSSv2
CVE-2021-43772
Trend Micro Security 2021 v17.0 (Consumer) contains a vulnerability that allows files inside the protected folder to be modified without any detection.
Trendmicro Antivirus\\+ Security
Trendmicro Internet Security
Trendmicro Maximum Security
Trendmicro Premium Security
6.3
CVSSv2
CVE-2020-25775
The Trend Micro Security 2020 (v16) consumer family of products is vulnerable to a security race condition arbitrary file deletion vulnerability that could allow an unprivileged user to manipulate the product's secure erase feature to delete files with a higher set of privil...
Trendmicro Antivirus\\+ 2020
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
6.9
CVSSv2
CVE-2020-15602
An untrusted search path remote code execution (RCE) vulnerability in the Trend Micro Secuity 2020 (v16.0.0.1146 and below) consumer family of products could allow an malicious user to run arbitrary code on a vulnerable system. As the Trend Micro installer tries to load DLL files...
Trendmicro Antivirus\\+ 2020
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
7.8
CVSSv2
CVE-2020-15603
An invalid memory read vulnerability in a Trend Micro Secuity 2020 (v16.0.0.1302 and below) consumer family of products' driver could allow an malicious user to manipulate the specific driver to do a system call operation with an invalid address, resulting in a potential sys...
Trendmicro Antivirus\\+ 2020
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
6.9
CVSSv2
CVE-2019-15628
Trend Micro Security (Consumer) 2020 (v16.0.1221 and below) is affected by a DLL hijacking vulnerability that could allow an malicious user to use a specific service as an execution and/or persistence mechanism which could execute a malicious program each time the service is star...
Trendmicro Antivirus \\+ Security 2020
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
6.8
CVSSv2
CVE-2018-18333
A DLL hijacking vulnerability in Trend Micro Security 2019 (Consumer) versions below 15.0.0.1163 and below could allow an malicious user to manipulate a specific DLL and escalate privileges on vulnerable installations.
Trendmicro Antivirus \\+ Security
Trendmicro Internet Security
Trendmicro Maximum Security
Trendmicro Premium Security
2 Github repositories
6.9
CVSSv2
CVE-2020-27695
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a local directory which can lead to obtaining administrative privileges during the installation of the product.
Trendmicro Antivirus\\+ Security 2020
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
6.9
CVSSv2
CVE-2020-27696
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a specific Windows system directory which can lead to obtaining administrative privileges during the installation of the product.
Trendmicro Antivirus\\+ Security 2020
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
7.2
CVSSv2
CVE-2018-15363
An Out-of-Bounds Read Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local malicious user to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target ...
Trendmicro Antivirus \\+ Security
Trendmicro Maximum Security
Trendmicro Premium Security
Trendmicro Internet Security
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »