CVE-2025-30642
- EPSS 0.02%
- Published 17.06.2025 20:11:03
- Last modified 09.09.2025 14:45:49
A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker to create a denial of service (DoS) situation on affected installations. Please note: an attacker must first obtain the ability to execute low-pri...
CVE-2025-30641
- EPSS 0.03%
- Published 17.06.2025 20:10:54
- Last modified 09.09.2025 14:45:46
A link following vulnerability in the anti-malware solution portion of Trend Micro Deep Security 20.0 agents could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to e...
CVE-2025-30640
- EPSS 0.03%
- Published 17.06.2025 20:10:21
- Last modified 09.09.2025 14:45:43
A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the tar...
CVE-2024-55955
- EPSS 0.02%
- Published 31.12.2024 17:15:09
- Last modified 09.09.2025 14:45:36
An incorrect permissions assignment vulnerability in Trend Micro Deep Security 20.0 agents between versions 20.0.1-9400 and 20.0.1-23340 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must f...
CVE-2024-51503
- EPSS 0.87%
- Published 19.11.2024 19:15:08
- Last modified 04.09.2025 23:45:42
A security agent manual scan command injection vulnerability in the Trend Micro Deep Security 20 Agent could allow an attacker to escalate privileges and execute arbitrary code on an affected machine. In certain circumstances, attackers that have le...
CVE-2023-52337
- EPSS 0.09%
- Published 23.01.2024 21:15:09
- Last modified 20.06.2025 19:15:28
An improper access control vulnerability in Trend Micro Deep Security 20.0 and Trend Micro Cloud One - Endpoint and Workload Security Agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker mus...
CVE-2023-52338
- EPSS 0.11%
- Published 23.01.2024 21:15:09
- Last modified 21.11.2024 08:39:35
A link following vulnerability in the Trend Micro Deep Security 20.0 and Trend Micro Cloud One - Endpoint and Workload Security Agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must firs...
CVE-2021-25252
- EPSS 0.06%
- Published 03.03.2021 16:15:13
- Last modified 21.11.2024 05:54:38
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.
CVE-2020-8607
- EPSS 0.08%
- Published 05.08.2020 14:15:13
- Last modified 21.11.2024 05:39:07
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel...
CVE-2019-15626
- EPSS 0.25%
- Published 17.10.2019 19:15:10
- Last modified 21.11.2024 04:29:09
The Deep Security Manager application (Versions 10.0, 11.0 and 12.0), when configured in a certain way, may transmit initial LDAP communication in clear text. This may result in confidentiality impact but does not impact integrity or availability.