Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro vulnerability protection 2.0 vulnerabilities and exploits
(subscribe to this query)
8.1
CVSSv3
CVE-2020-15601
If LDAP authentication is enabled, an LDAP authentication bypass vulnerability in Trend Micro Deep Security 10.x-12.x could allow an unauthenticated attacker with prior knowledge of the targeted organization to bypass manager authentication. Enabling multi-factor authentication p...
Trendmicro Deep Security Manager 10.0
Trendmicro Deep Security Manager 11.0
Trendmicro Deep Security Manager 12.0
Trendmicro Vulnerability Protection 2.0
8.1
CVSSv3
CVE-2020-15605
If LDAP authentication is enabled, an LDAP authentication bypass vulnerability in Trend Micro Vulnerability Protection 2.0 SP2 could allow an unauthenticated attacker with prior knowledge of the targeted organization to bypass manager authentication. Enabling multi-factor authent...
Trendmicro Deep Security Manager 10.0
Trendmicro Deep Security Manager 11.0
Trendmicro Deep Security Manager 12.0
Trendmicro Vulnerability Protection 2.0
7.8
CVSSv3
CVE-2020-8601
Trend Micro Vulnerability Protection 2.0 is affected by a vulnerability that could allow an attack to use the product installer to load other DLL files located in the same directory.
Trendmicro Vulnerability Protection 2.0
7.2
CVSSv3
CVE-2020-8602
A vulnerability in the management consoles of Trend Micro Deep Security 10.0-12.0 and Trend Micro Vulnerability Protection 2.0 SP2 may allow an authenticated attacker with full control privileges to bypass file integrity checks, leading to remote code execution.
Trendmicro Deep Security Manager 10.0
Trendmicro Deep Security Manager 11.0
Trendmicro Deep Security Manager 12.0
Trendmicro Vulnerability Protection 2.0
6.7
CVSSv3
CVE-2020-8607
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a syst...
Trendmicro Antivirus Toolkit
Trendmicro Apex One 2019
Trendmicro Apex One Saas
Trendmicro Deep Security 9.6
Trendmicro Deep Security 10.0
Trendmicro Deep Security 11.0
Trendmicro Deep Security 12.0
Trendmicro Officescan Xg
Trendmicro Officescan Business Security 9.0
Trendmicro Officescan Business Security 9.5
Trendmicro Officescan Business Security 10.0
Trendmicro Officescan Business Security Service -
Trendmicro Officescan Cloud 15
Trendmicro Officescan Cloud 16.0
Trendmicro Online Scan 8.0
Trendmicro Portable Security 2.0
Trendmicro Portable Security 3.0
Trendmicro Rootkit Buster 2.2
Trendmicro Safe Lock -
Trendmicro Safe Lock 2.0
Trendmicro Serverprotect 5.8
Trendmicro Serverprotect 6.0
4.9
CVSSv3
CVE-2019-9488
Trend Micro Deep Security Manager (10.x, 11.x) and Vulnerability Protection (2.0) are vulnerable to a XML External Entity Attack. However, for the attack to be possible, the attacker must have root/admin access to a protected host which is authorized to communicate with the Deep ...
Trendmicro Deep Security Manager 11.3
Trendmicro Deep Security Manager 11.0
Trendmicro Deep Security Manager 10.0
Trendmicro Vulnerability Protection 2.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-0044
client side
CVE-2021-47601
deserialization
CVE-2024-34994
encryption
CVE-2021-47609
CVE-2024-37079
CVE-2024-38608
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started