Trendmicro Internet Security vulnerabilities
17 known vulnerabilities affecting trendmicro/internet_security.
Total CVEs
17
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH10MEDIUM5
Vulnerabilities
Page 1 of 1
CVE-2024-23940HIGHCVSS 7.8fixed in 6.0.21032024-01-29
CVE-2024-23940 [HIGH] CWE-427 CVE-2024-23940: Trend Micro uiAirSupport, included in the Trend Micro Security 2023 family of consumer products, ver
Trend Micro uiAirSupport, included in the Trend Micro Security 2023 family of consumer products, version 6.0.2092 and below is vulnerable to a DLL hijacking/proxying vulnerability, which if exploited could allow an attacker to impersonate and modify a library to execute code on the system and ultimately escalate privileges on an affected system.
nvd
CVE-2021-43772MEDIUMCVSS 5.5≤ 20212021-12-03
CVE-2021-43772 [MEDIUM] CWE-552 CVE-2021-43772: Trend Micro Security 2021 v17.0 (Consumer) contains a vulnerability that allows files inside the pro
Trend Micro Security 2021 v17.0 (Consumer) contains a vulnerability that allows files inside the protected folder to be modified without any detection.
nvd
CVE-2018-18333HIGHCVSS 7.8fixed in 15.0.0.11632019-02-05
CVE-2018-18333 [HIGH] CWE-426 CVE-2018-18333: A DLL hijacking vulnerability in Trend Micro Security 2019 (Consumer) versions below 15.0.0.1163 and
A DLL hijacking vulnerability in Trend Micro Security 2019 (Consumer) versions below 15.0.0.1163 and below could allow an attacker to manipulate a specific DLL and escalate privileges on vulnerable installations.
nvd
CVE-2018-10513HIGHCVSS 7.8≤ 12.02018-08-30
CVE-2018-10513 [HIGH] CWE-502 CVE-2018-10513: A Deserialization of Untrusted Data Privilege Escalation vulnerability in Trend Micro Security 2018
A Deserialization of Untrusted Data Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.
nvd
CVE-2018-10514HIGHCVSS 7.8≤ 12.02018-08-30
CVE-2018-10514 [HIGH] CWE-269 CVE-2018-10514: A Missing Impersonation Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) p
A Missing Impersonation Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.
nvd
CVE-2018-15363HIGHCVSS 7.8≤ 12.02018-08-30
CVE-2018-15363 [HIGH] CWE-125 CVE-2018-15363: An Out-of-Bounds Read Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) pro
An Out-of-Bounds Read Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.
nvd
CVE-2018-3608CRITICALCVSS 9.8≤ 12.0.11912018-07-06
CVE-2018-3608 [CRITICAL] CWE-94 CVE-2018-3608: A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) Use
A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes.
nvd
CVE-2018-6232HIGHCVSS 7.8≤ 12.02018-05-25
CVE-2018-6232 [HIGH] CWE-120 CVE-2018-6232: A buffer overflow privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018
A buffer overflow privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local attacker to escalate privileges on vulnerable installations due to a flaw within processing of IOCTL 0x22205C by the tmnciesc.sys driver. An attacker must first obtain the ability to execute low-privileged code on the target system in
nvd
CVE-2018-6233HIGHCVSS 7.8≤ 12.02018-05-25
CVE-2018-6233 [HIGH] CWE-120 CVE-2018-6233: A buffer overflow privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018
A buffer overflow privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local attacker to escalate privileges on vulnerable installations due to a flaw within processing of IOCTL 0x222060 by the tmnciesc.sys driver. An attacker must first obtain the ability to execute low-privileged code on the target system in
nvd
CVE-2018-6235HIGHCVSS 7.8≤ 12.02018-05-25
CVE-2018-6235 [HIGH] CWE-787 CVE-2018-6235: An Out-of-Bounds write privilege escalation vulnerability in Trend Micro Maximum Security (Consumer)
An Out-of-Bounds write privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local attacker to escalate privileges on vulnerable installations due to a flaw within processing of IOCTL 0x222814 by the tmnciesc.sys driver. An attacker must first obtain the ability to execute low-privileged code on the target syst
nvd
CVE-2018-6236HIGHCVSS 7.0≤ 12.02018-05-25
CVE-2018-6236 [HIGH] CWE-362 CVE-2018-6236: A Time-of-Check Time-of-Use privilege escalation vulnerability in Trend Micro Maximum Security (Cons
A Time-of-Check Time-of-Use privilege escalation vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local attacker to escalate privileges on vulnerable installations due to a flaw within processing of IOCTL 0x222813 by the tmusa driver. An attacker must first obtain the ability to execute low-privileged code on the target system
nvd
CVE-2018-6234MEDIUMCVSS 5.5≤ 12.02018-05-25
CVE-2018-6234 [MEDIUM] CWE-125 CVE-2018-6234: An Out-of-Bounds Read Information Disclosure vulnerability in Trend Micro Maximum Security (Consumer
An Out-of-Bounds Read Information Disclosure vulnerability in Trend Micro Maximum Security (Consumer) 2018 could allow a local attacker to disclose sensitive information on vulnerable installations due to a flaw within processing of IOCTL 0x222814 by the tmnciesc.sys driver. An attacker must first obtain the ability to execute low-privileged code on t
nvd
CVE-2017-5565MEDIUMCVSS 6.7≤ 11.1.10052017-03-21
CVE-2017-5565 [MEDIUM] CWE-427 CVE-2017-5565: Code injection vulnerability in Trend Micro Maximum Security 11.0 (and earlier), Internet Security 1
Code injection vulnerability in Trend Micro Maximum Security 11.0 (and earlier), Internet Security 11.0 (and earlier), and Antivirus+ Security 11.0 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Trend Micro process via a "DoubleAgent" attack. One perspective on this issu
nvd
CVE-2016-1225MEDIUMCVSS 6.5v8.0v10.02016-06-19
CVE-2016-1225 [MEDIUM] CWE-200 CVE-2016-1225: Trend Micro Internet Security 8 and 10 allows remote attackers to read arbitrary files via unspecifi
Trend Micro Internet Security 8 and 10 allows remote attackers to read arbitrary files via unspecified vectors.
nvd
CVE-2016-1226MEDIUMCVSS 6.1v8.0v10.02016-06-19
CVE-2016-1226 [MEDIUM] CWE-79 CVE-2016-1226: Cross-site scripting (XSS) vulnerability in Trend Micro Internet Security 8 and 10 allows remote att
Cross-site scripting (XSS) vulnerability in Trend Micro Internet Security 8 and 10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
nvd
CVE-2010-3189CRITICALCVSS 9.3PoCv20102010-08-31
CVE-2010-3189 [CRITICAL] CWE-94 CVE-2010-3189: The extSetOwner function in the UfProxyBrowserCtrl ActiveX control (UfPBCtrl.dll) in Trend Micro Int
The extSetOwner function in the UfProxyBrowserCtrl ActiveX control (UfPBCtrl.dll) in Trend Micro Internet Security Pro 2010 allows remote attackers to execute arbitrary code via an invalid address that is dereferenced as a pointer.
nvd
CVE-2009-0686HIGHCVSS 7.2PoCv2008v20092009-04-01
CVE-2009-0686 [HIGH] CWE-399 CVE-2009-0686: The TrendMicro Activity Monitor Module (tmactmon.sys) 2.52.0.1002 in Trend Micro Internet Pro 2008 a
The TrendMicro Activity Monitor Module (tmactmon.sys) 2.52.0.1002 in Trend Micro Internet Pro 2008 and 2009, and Security Pro 2008 and 2009, allows local users to gain privileges via a crafted IRP in a METHOD_NEITHER IOCTL request to \Device\tmactmon that overwrites memory.
nvd