Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2018-18333
A DLL hijacking vulnerability in Trend Micro Security 2019 (Consumer) versions below 15.0.0.1163 and below could allow an malicious user to manipulate a specific DLL and escalate privileges on vulnerable installations.
Trendmicro Antivirus \\+ Security
Trendmicro Internet Security
Trendmicro Maximum Security
Trendmicro Premium Security
2 Github repositories
5.5
CVSSv3
CVE-2021-43772
Trend Micro Security 2021 v17.0 (Consumer) contains a vulnerability that allows files inside the protected folder to be modified without any detection.
Trendmicro Antivirus\\+ Security
Trendmicro Internet Security
Trendmicro Maximum Security
Trendmicro Premium Security
7.8
CVSSv3
CVE-2021-36744
Trend Micro Security (Consumer) 2021 and 2020 are vulnerable to a directory junction vulnerability which could allow an malicious user to exploit the system to escalate privileges and create a denial of service.
Trendmicro Maximum Security 2019 15.0
Trendmicro Maximum Security 2020 16.0
Trendmicro Maximum Security 2021 17.0
Trendmicro Security For Best Buy 2021
Trendmicro Maximum Security 2021 17.2
7.8
CVSSv3
CVE-2020-24559
A vulnerability in Trend Micro Apex One, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services on macOS may allow an malicious user to manipulate a certain binary to load and run a script from a user-writable folder, which then would allow them to execut...
Trendmicro Apex One 2019
Trendmicro Apex One Saas
Trendmicro Officescan Xg
Trendmicro Worry-free Business Security 10.0
Trendmicro Worry-free Business Security Services -
7.8
CVSSv3
CVE-2019-14686
A DLL hijacking vulnerability exists in the Trend Micro Security's 2019 consumer family of products (v15) Folder Shield component and the standalone Trend Micro Ransom Buster (1.0) tool in which, if exploited, would allow an malicious user to load a malicious DLL, leading to...
Trendmicro Premium Security 2019 15.0
Trendmicro Antivirus \\+ Security 2019 15.0
Trendmicro Internet Security 2019 15.0
Trendmicro Maximum Security 2019 15.0
Trendmicro Ransom Buster 1.0
6.7
CVSSv3
CVE-2017-5565
Code injection vulnerability in Trend Micro Maximum Security 11.0 (and previous versions), Internet Security 11.0 (and previous versions), and Antivirus+ Security 11.0 (and previous versions) allows a local malicious user to bypass a self-protection mechanism, inject arbitrary co...
Trendmicro Premium Security
Trendmicro Maximum Security
Trendmicro Antivirus\\+
Trendmicro Internet Security
1 Article
7.5
CVSSv3
CVE-2022-23119
A directory traversal vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an malicious user to read arbitrary files from the file system. Please note: an attacker must first obtain compromised access to the...
Trendmicro Deep Security Agent 10.0
Trendmicro Deep Security Agent 11.0
Trendmicro Deep Security Agent 12.0
Trendmicro Deep Security Agent
1 Github repository
7.8
CVSSv3
CVE-2022-23120
A code injection vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an malicious user to escalate privileges and run arbitrary code in the context of root. Please note: an attacker must first obtain access...
Trendmicro Deep Security Agent 10.0
Trendmicro Deep Security Agent 11.0
Trendmicro Deep Security Agent 12.0
Trendmicro Deep Security Agent
1 Github repository
7
CVSSv3
CVE-2018-6218
A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an malicious user to run arbitrary code on a vulnerable system.
Trendmicro Deep Security 10.0
Trendmicro Deep Security 10.1
Trendmicro Endpoint Sensor 1.6
Trendmicro Officescan 11.0
Trendmicro Officescan 12.0
Trendmicro Security 12.0
Trendmicro Worry-free Business Security 9.5
8.1
CVSSv3
CVE-2020-15601
If LDAP authentication is enabled, an LDAP authentication bypass vulnerability in Trend Micro Deep Security 10.x-12.x could allow an unauthenticated attacker with prior knowledge of the targeted organization to bypass manager authentication. Enabling multi-factor authentication p...
Trendmicro Deep Security Manager 10.0
Trendmicro Deep Security Manager 11.0
Trendmicro Deep Security Manager 12.0
Trendmicro Vulnerability Protection 2.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3201
CVE-2024-4779
CVE-2024-35090
CVE-2024-5084
hard-coded
CVE-2024-4985
HTML injection
CVE-2024-33655
local file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »