Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2016-7547
A command execution flaw on the Trend Micro Threat Discovery Appliance 2.6.1062r1 exists with the timezone parameter in the admin_sys_time.cgi interface.
Trendmicro Threat Discovery Appliance 2.6.1062
2 Metasploit modules
7.5
CVSSv2
CVE-2016-6269
Multiple directory traversal vulnerabilities in Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allow remote malicious users to read and delete arbitrary files via the tmpfname parameter to (1) log_mgt_adhocquery_ajaxhan...
Trendmicro Smart Protection Server 2.5
Trendmicro Smart Protection Server 2.6
Trendmicro Smart Protection Server 3.0
7.5
CVSSv2
CVE-2016-4351
SQL injection vulnerability in the authentication functionality in Trend Micro Email Encryption Gateway (TMEEG) 5.5 before build 1107 allows remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Trendmicro Email Encryption Gateway
7.5
CVSSv2
CVE-2008-2433
The web management console in Trend Micro OfficeScan 7.0 up to and including 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote malicious users to hijac...
Trendmicro Client Server Messaging Suite 3.5
Trendmicro Client Server Messaging Suite 3.6
Trendmicro Officescan
Trendmicro Worry-free Business Security 5.0
7.5
CVSSv2
CVE-2001-0689
Vulnerability in TrendMicro Virus Control System 1.8 allows a remote malicious user to view configuration files and change the configuration via a certain CGI program.
Trend Micro Virus Control System 1.8
7.2
CVSSv2
CVE-2022-30700
An incorrect permission assignment vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local malicious user to load a DLL with escalated privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privilege...
Trendmicro Apex One 2019
Trendmicro Apex One
7.2
CVSSv2
CVE-2022-30701
An uncontrolled search path element vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local malicious user to craft a special configuration file to load an untrusted library with escalated privileges on affected installations. Please note: an attacker ...
Trendmicro Apex One 2019
Trendmicro Apex One
7.2
CVSSv2
CVE-2022-30523
Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow a low privileged local malicious user to delete the contents of an arbitrary folder as SYSTEM which can then be used for priv...
Trendmicro Password Manager
7.2
CVSSv2
CVE-2022-24680
A security link following local privilege escalation vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow a local malicious user to crea...
Trendmicro Apex One -
Trendmicro Apex One 2019
Trendmicro Worry-free Business Security 10.0
Trendmicro Worry-free Business Security Services -
7.2
CVSSv2
CVE-2022-24679
A security link following local privilege escalation vulnerability in Trend Micro Apex One, Trend Micro Apex One as a Service, Trend Micro Worry-Free Business Security 10.0 SP1 and Trend Micro Worry-Free Business Security Services agents could allow a local malicious user to crea...
Trendmicro Apex One -
Trendmicro Apex One 2019
Trendmicro Worry-free Business Security 10.0
Trendmicro Worry-free Business Security Services -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »