Show filters
27 Total Results
Displaying 1-10 of 27
Sort by:
Attacker Value
Unknown
CVE-2019-18187
Disclosure Date: October 28, 2019 (last updated November 27, 2024)
Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication.
1
Attacker Value
Unknown
CVE-2021-25252
Disclosure Date: March 03, 2021 (last updated November 28, 2024)
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.
0
Attacker Value
Unknown
CVE-2020-8607
Disclosure Date: August 05, 2020 (last updated February 21, 2025)
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2019-18189
Disclosure Date: October 28, 2019 (last updated November 27, 2024)
A directory traversal vulnerability in Trend Micro Apex One, OfficeScan (11.0, XG) and Worry-Free Business Security (9.5, 10.0) may allow an attacker to bypass authentication and log on to an affected product's management console as a root user. The vulnerability does not require authentication.
0
Attacker Value
Unknown
CVE-2019-9492
Disclosure Date: July 26, 2019 (last updated November 27, 2024)
A DLL side-loading vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow an authenticated attacker to gain code execution and terminate the product's process - disabling endpoint protection. The attacker must have already gained authentication and have local access to the vulnerable system.
0
Attacker Value
Unknown
CVE-2019-9489
Disclosure Date: April 05, 2019 (last updated November 27, 2024)
A directory traversal vulnerability in Trend Micro Apex One, OfficeScan (versions XG and 11.0), and Worry-Free Business Security (versions 10.0, 9.5 and 9.0) could allow an attacker to modify arbitrary files on the affected product's management console.
0
Attacker Value
Unknown
CVE-2018-3608
Disclosure Date: July 06, 2018 (last updated November 27, 2024)
A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes.
0
Attacker Value
Unknown
CVE-2018-10507
Disclosure Date: June 12, 2018 (last updated November 26, 2024)
A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a attacker to take a series of steps to bypass or render the OfficeScan Unauthorized Change Prevention inoperable on vulnerable installations. An attacker must already have administrator privileges in order to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2018-10509
Disclosure Date: June 12, 2018 (last updated November 26, 2024)
A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a attacker to exploit it via a Browser Refresh attack on vulnerable installations. An attacker must be using a AD logon user account in order to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2018-10508
Disclosure Date: June 12, 2018 (last updated November 26, 2024)
A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a attacker to use a specially crafted URL to elevate account permissions on vulnerable installations. An attacker must already have at least guest privileges in order to exploit this vulnerability.
0