Filtered by vendor Trendmicro
Subscriptions
Total
537 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-30642 | 1 Trendmicro | 1 Deep Security Agent | 2025-06-20 | 5.5 Medium |
A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker to create a denial of service (DoS) situation on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | ||||
CVE-2025-49211 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-20 | 7.7 High |
A SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. | ||||
CVE-2025-49217 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-18 | 9.8 Critical |
An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49213 but is in a different method. | ||||
CVE-2025-48443 | 1 Trendmicro | 1 Password Manager | 2025-06-18 | 6.7 Medium |
Trend Micro Password Manager (Consumer) version 5.0.0.1266 and below is vulnerable to a Link Following Local Privilege Escalation Vulnerability that could allow a local attacker to leverage this vulnerability to delete files in the context of an administrator when the administrator installs Trend Micro Password Manager. | ||||
CVE-2025-49384 | 1 Trendmicro | 1 Maximum Security 2022 | 2025-06-18 | 7.8 High |
Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own. | ||||
CVE-2025-49385 | 1 Trendmicro | 1 Maximum Security 2022 | 2025-06-18 | 7.8 High |
Trend Micro Security 17.8 (Consumer) is vulnerable to a link following local privilege escalation vulnerability that could allow a local attacker to unintentionally delete privileged Trend Micro files including its own. | ||||
CVE-2025-49212 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-18 | 9.8 Critical |
An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49220 but is in a different method. | ||||
CVE-2025-49213 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-18 | 9.8 Critical |
An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49212 but is in a different method. | ||||
CVE-2025-49214 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-18 | 8.8 High |
An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a post-authentication remote code execution on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. | ||||
CVE-2025-49215 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-18 | 8.8 High |
A post-auth SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. | ||||
CVE-2025-49216 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-18 | 9.8 Critical |
An authentication bypass vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to access key methods as an admin user and modify product configurations on affected installations. | ||||
CVE-2025-49218 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-18 | 7.7 High |
A post-auth SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. This is similar to, but not identical to CVE-2025-49215. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. | ||||
CVE-2025-47867 | 1 Trendmicro | 1 Apex Central | 2025-06-18 | 7.5 High |
A Local File Inclusion vulnerability in a Trend Micro Apex Central widget in versions below 8.0.6955 could allow an attacker to include arbitrary files to execute as PHP code and lead to remote code execution on affected installations. | ||||
CVE-2025-47865 | 1 Trendmicro | 1 Apex Central | 2025-06-18 | 7.5 High |
A Local File Inclusion vulnerability in a Trend Micro Apex Central widget below version 8.0.6955 could allow an attacker to gain remote code execution on affected installations. | ||||
CVE-2025-49219 | 1 Trendmicro | 1 Apex Central | 2025-06-18 | 9.8 Critical |
An insecure deserialization operation in Trend Micro Apex Central below versions 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49220 but is in a different method. | ||||
CVE-2025-49220 | 1 Trendmicro | 1 Apex Central | 2025-06-18 | 9.8 Critical |
An insecure deserialization operation in Trend Micro Apex Central below version 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49219 but is in a different method. | ||||
CVE-2025-49156 | 1 Trendmicro | 2 Apexone Op, Apexone Saas | 2025-06-17 | 7 High |
A link following vulnerability in the Trend Micro Apex One scan engine could allow a local attacker to escalation privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | ||||
CVE-2025-47866 | 1 Trendmicro | 1 Apex Central | 2025-06-17 | 4.3 Medium |
An unrestricted file upload vulnerability in a Trend Micro Apex Central widget below version 8.0.6955 could allow an attacker to upload arbitrary files on affected installations. | ||||
CVE-2025-49158 | 1 Trendmicro | 2 Apexone Op, Apexone Saas | 2025-06-17 | 6.7 Medium |
An uncontrolled search path vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalation privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | ||||
CVE-2025-49157 | 1 Trendmicro | 2 Apexone Op, Apexone Saas | 2025-06-17 | 7.8 High |
A link following vulnerability in the Trend Micro Apex One Damage Cleanup Engine could allow a local attacker to escalation privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. |