Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2023-34144
An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local malicious user to escalate their privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged ...
Trendmicro Apex One
Trendmicro Apex One 2019
7.8
CVSSv3
CVE-2023-34145
An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local malicious user to escalate their privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged ...
Trendmicro Apex One
Trendmicro Apex One 2019
7.8
CVSSv3
CVE-2023-34146
An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local malicious user to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations. Please note: an...
Trendmicro Apex One
Trendmicro Apex One 2019
7.8
CVSSv3
CVE-2023-34147
An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local malicious user to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations. Please note: an...
Trendmicro Apex One
Trendmicro Apex One 2019
7.8
CVSSv3
CVE-2023-34148
An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local malicious user to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations. Please note: an...
Trendmicro Apex One
Trendmicro Apex One 2019
7.5
CVSSv3
CVE-2023-35695
A remote attacker could leverage a vulnerability in Trend Micro Mobile Security (Enterprise) 9.8 SP5 to download a particular log file which may contain sensitive information regarding the product.
Trendmicro Mobile Security 9.8
7.8
CVSSv3
CVE-2023-28929
Trend Micro Security 2021, 2022, and 2023 (Consumer) are vulnerable to a DLL Hijacking vulnerability which could allow an malicious user to use a specific executable file as an execution and/or persistence mechanism which could execute a malicious program each time the executable...
Trendmicro Antivirus\\+ Security 2021
Trendmicro Internet Security 2021
Trendmicro Maximum Security 2021
Trendmicro Premium Security 2021
Trendmicro Antivirus\\+ Security 2022
Trendmicro Internet Security 2022
Trendmicro Maximum Security 2022
Trendmicro Premium Security 2022
Trendmicro Antivirus\\+ Security 2023
Trendmicro Internet Security 2023
Trendmicro Maximum Security 2023
Trendmicro Premium Security 2023
8.8
CVSSv3
CVE-2023-32530
Vulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution. Please note: an attacker must first obtain authentication on the target system in order t...
Trendmicro Apex Central 2019
8.8
CVSSv3
CVE-2023-25069
TXOne StellarOne has an improper access control privilege escalation vulnerability in every version before V2.0.1160 that could allow a malicious, falsely authenticated user to escalate his privileges to administrator level. With these privileges, an attacker could perform action...
Trendmicro Txone Stellarone
6.8
CVSSv3
CVE-2023-28005
A vulnerability in Trend Micro Endpoint Encryption Full Disk Encryption version 6.0.0.3204 and below could allow an attacker with physical access to an affected device to bypass Microsoft Windows? Secure Boot process in an attempt to execute other attacks to obtain access to the ...
Trendmicro Trend Micro Endpoint Encryption
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »