Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trend micro antivirus vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2018-3608
A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an malicious user to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be ...
Trendmicro Antivirus + Security
Trendmicro Internet Security
Trendmicro Maximum Security
Trendmicro Premium Security
Trendmicro Officescan 12.0
Trendmicro Officescan 11.0
Trendmicro Officescan Monthly 12.0
Trendmicro Officescan Monthly 11.0
1 Github repository
828
VMScore
CVE-2008-5545
Trend Micro VSAPI 8.700.0.1004 in Trend Micro AntiVirus, when Internet Explorer 6 or 7 is used, allows remote malicious users to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have...
Trend Micro Trend Micro Antivirus 8.700.0.1004
756
VMScore
CVE-2022-27883
A link following vulnerability in Trend Micro Antivirus for Mac 11.5 could allow an malicious user to create a specially-crafted file as a symlink that can lead to privilege escalation. Please note that an attacker must at least have low-level privileges on the system to attempt ...
Trendmicro Antivirus For Mac
725
VMScore
CVE-2014-9641
The tmeext.sys driver prior to 2.0.0.1015 in Trend Micro Antivirus Plus, Internet Security, and Maximum Security allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x00222400 IOCTL call.
Trendmicro Tmeext.sys
1 EDB exploit
694
VMScore
CVE-2020-15603
An invalid memory read vulnerability in a Trend Micro Secuity 2020 (v16.0.0.1302 and below) consumer family of products' driver could allow an malicious user to manipulate the specific driver to do a system call operation with an invalid address, resulting in a potential sys...
Trendmicro Antivirus+ 2020
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
694
VMScore
CVE-2007-1591
VsapiNT.sys in the Scan Engine 8.0 for Trend Micro AntiVirus 14.10.1041, and other products, allows remote malicious users to cause a denial of service (kernel fault and system crash) via a crafted UPX file with a certain field that triggers a divide-by-zero error.
Trend Micro Trend Micro Antivirus 14.10.1041
668
VMScore
CVE-2019-18190
Trend Micro Security (Consumer) 2020 (v16.x) is affected by a vulnerability in where null pointer dereference errors result in the crash of application, which could potentially lead to possible unsigned code execution under certain circumstances.
Trendmicro Antivirus+ Security 2020
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
668
VMScore
CVE-2005-0533
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI prior to 7.510, as used in multiple Trend Micro products, allows remote malicious users to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Trend Micro Interscan Emanager 3.5.2
Trend Micro Scanmail 3.81
Trend Micro Serverprotect 2.5
Trend Micro Interscan Viruswall 3.0.1
Trend Micro Officescan Corporate 6.5
Trend Micro Officescan Corporate 3.11
Trend Micro Officescan Corporate 3.0
Trend Micro Serverprotect 1.25 2007-02-16
Trend Micro Interscan Viruswall 3.52
Trend Micro Interscan Viruswall 3.5
Trend Micro Interscan Viruswall 3.4
Trend Micro Serverprotect 1.3
Trend Micro Interscan Viruswall Gold
Trend Micro Scanmail Gold
Trend Micro Interscan Web Security Suite Gold
Trend Micro Interscan Viruswall 3.52 Build1466
Trend Micro Interscan Emanager 3.6
Trend Micro Officescan Corporate 3.13
Trend Micro Officescan Corporate 5.02
Trend Micro Scanmail 2.51
Trend Micro Scanmail 6.1
Trend Micro Interscan Webmanager 1.2
641
VMScore
CVE-2022-24671
A link following privilege escalation vulnerability in Trend Micro Antivirus for Max 11.0.2150 and below could allow a local malicious user to modify a file during the update process and escalate their privileges. Please note: an attacker must first obtain the ability to execute ...
Trendmicro Antivirus
641
VMScore
CVE-2020-25776
Trend Micro Antivirus for Mac 2020 (Consumer) is vulnerable to a symbolic link privilege escalation attack where an attacker could exploit a critical file on the system to escalate their privileges. An attacker must first obtain the ability to execute low-privileged code on the t...
Trendmicro Antivirus 2019
Trendmicro Antivirus 2020
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »