Loading HuntDB...

Trend Micro, Inc.

23 Products 119 CVEs

CVE Severity Distribution (All Time)

Critical
1
High
21
Medium
8
Low
0

Timeline Overview

Last 30 Days 0 CVEs
Last 6 Months 0 CVEs
Last Year 18 CVEs

Recent CVEs

View all
CVE-2024-55955 MEDIUM 6 months ago

An incorrect permissions assignment vulnerability in Trend Micro Deep Security 20.0 agents between versions 20.0.1-9400 and 20.0.1-23340 could allow …

CVE-2024-55917 HIGH 6 months ago

An origin validation error vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Pl…

CVE-2024-55632 HIGH 6 months ago

A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. …

CVE-2024-55631 HIGH 6 months ago

An engine link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Plea…

CVE-2024-53647 MEDIUM 6 months ago

Trend Micro ID Security, version 3.0 and below contains a vulnerability that could allow an attacker to send an unlimited number of email verificatio…

CVE-2024-52050 HIGH 6 months ago

A LogServer arbitrary file creation vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installatio…

CVE-2024-52049 HIGH 6 months ago

A LogServer link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. This …

CVE-2024-52048 HIGH 6 months ago

A LogServer link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. This …

CVE-2024-52047 HIGH 6 months ago

A widget local file inclusion vulnerability in Trend Micro Apex One could allow a remote attacker to execute arbitrary code on affected installations…

CVE-2024-51503 HIGH 7 months, 1 week ago

A security agent manual scan command injection vulnerability in the Trend Micro Deep Security 20 Agent could allow an attacker to escalate privileges…