Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-32523
Affected versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 contain some widgets that would allow a remote user to bypass authentication and potentially chain with other vulnerabilities. Please note: an attacker must first obtain the ability to execute low-privileged co...
Trendmicro Mobile Security 9.8
NA
CVE-2023-32525
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote malicious user to create arbitrary files on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target syste...
Trendmicro Mobile Security 9.8
NA
CVE-2023-32527
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable .php files that could allow a remote malicious user to execute arbitrary code on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system...
Trendmicro Mobile Security 9.8
NA
CVE-2023-32529
Vulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution. Please note: an attacker must first obtain authentication on the target system in order t...
Trendmicro Apex Central 2019
NA
CVE-2023-32531
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an malicious user to achieve remote code execution on affected servers. This is similar to, but not identical to CVE-2023-32532 up to and includi...
Trendmicro Apex Central 2019
NA
CVE-2023-32533
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an malicious user to achieve remote code execution on affected servers. This is similar to, but not identical to CVE-2023-32531 up to and includi...
Trendmicro Apex Central 2019
NA
CVE-2023-32537
Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the ta...
Trendmicro Apex Central 2019
NA
CVE-2023-32556
A link following vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local malicious user to disclose sensitive information. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to ...
Trendmicro Apex One
Trendmicro Apex One 2019
NA
CVE-2023-34144
An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local malicious user to escalate their privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged ...
Trendmicro Apex One
Trendmicro Apex One 2019
NA
CVE-2023-28929
Trend Micro Security 2021, 2022, and 2023 (Consumer) are vulnerable to a DLL Hijacking vulnerability which could allow an malicious user to use a specific executable file as an execution and/or persistence mechanism which could execute a malicious program each time the executable...
Trendmicro Antivirus\\+ Security 2021
Trendmicro Internet Security 2021
Trendmicro Maximum Security 2021
Trendmicro Premium Security 2021
Trendmicro Antivirus\\+ Security 2022
Trendmicro Internet Security 2022
Trendmicro Maximum Security 2022
Trendmicro Premium Security 2022
Trendmicro Antivirus\\+ Security 2023
Trendmicro Internet Security 2023
Trendmicro Maximum Security 2023
Trendmicro Premium Security 2023
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »