Filtered by vendor Trendmicro
Subscriptions
Filtered by product Endpoint Encryption Policy Server
Subscriptions
Total
8 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-49211 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-20 | 7.7 High |
A SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. | ||||
CVE-2025-49217 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-18 | 9.8 Critical |
An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49213 but is in a different method. | ||||
CVE-2025-49212 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-18 | 9.8 Critical |
An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49220 but is in a different method. | ||||
CVE-2025-49213 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-18 | 9.8 Critical |
An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49212 but is in a different method. | ||||
CVE-2025-49214 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-18 | 8.8 High |
An insecure deserialization operation in the Trend Micro Endpoint Encryption PolicyServer could lead to a post-authentication remote code execution on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. | ||||
CVE-2025-49215 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-18 | 8.8 High |
A post-auth SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. | ||||
CVE-2025-49216 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-18 | 9.8 Critical |
An authentication bypass vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to access key methods as an admin user and modify product configurations on affected installations. | ||||
CVE-2025-49218 | 1 Trendmicro | 1 Endpoint Encryption Policy Server | 2025-06-18 | 7.7 High |
A post-auth SQL injection vulnerability in the Trend Micro Endpoint Encryption PolicyServer could allow an attacker to escalate privileges on affected installations. This is similar to, but not identical to CVE-2025-49215. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. |
Page 1 of 1.