Trend Micro Latest Vulnerabilities
Latest vulnerabilities published by trend micro
Vulnerability Published:
๐๏ธ Published
- Anytime
Sort By:
๐๏ธ Published Date
- Descending
Local Privilege Escalation Vulnerability in Trend Micro Security
CVE-2025-49385Trend MicroTrend Micro Internet S...7.8HIGHLocal Privilege Escalation Vulnerability in Trend Micro Security Software
CVE-2025-49384Trend MicroTrend Micro Internet S...7.8HIGHLocal Privilege Escalation Vulnerability in Trend Micro Password Manager
CVE-2025-48443Trend MicroTrend Micro Password M...6.7MEDIUMPost-Authentication SQL Injection in Trend Micro Endpoint Encryption PolicyServer
CVE-2025-49218Trend MicroTrend Micro Endpoint E...7.7HIGHInsecure Deserialization Vulnerability in Trend Micro Endpoint Encryption PolicyServer
CVE-2025-49217Trend MicroTrend Micro Endpoint E...9.8CRITICALAuthentication Bypass in Trend Micro Endpoint Encryption PolicyServer
CVE-2025-49216Trend MicroTrend Micro Endpoint E...9.8CRITICALPost-Authentication SQL Injection Vulnerability in Trend Micro Endpoint Encryption
CVE-2025-49215Trend MicroTrend Micro Endpoint E...8.8HIGHInsecure Deserialization in Trend Micro Endpoint Encryption PolicyServer
CVE-2025-49214Trend MicroTrend Micro Endpoint E...8.8HIGHInsecure Deserialization Vulnerability in Trend Micro Endpoint Encryption PolicyServer
CVE-2025-49213Trend MicroTrend Micro Endpoint E...9.8CRITICALInsecure Deserialization in Trend Micro Endpoint Encryption PolicyServer
CVE-2025-49212Trend MicroTrend Micro Endpoint E...9.8CRITICALSQL Injection Vulnerability in Trend Micro Endpoint Encryption PolicyServer
CVE-2025-49211Trend MicroTrend Micro Endpoint E...7.7HIGHLink Following Vulnerability in Trend Micro Deep Security Agents
CVE-2025-30642Trend MicroTrend Micro Deep Security5.5MEDIUMPrivilege Escalation Vulnerability in Trend Micro Deep Security
CVE-2025-30641Trend MicroTrend Micro Deep Security7.8HIGHLink Following Vulnerability in Trend Micro Deep Security Agents
CVE-2025-30640Trend MicroTrend Micro Deep Security7.8HIGHServer-side Request Forgery Vulnerability in Trend Micro Apex Central SaaS
CVE-2025-30680Trend MicroTrend Micro Apex Central7.5HIGHServer-Side Request Forgery Vulnerability in Trend Micro Apex Central
CVE-2025-30679Trend MicroTrend Micro Apex Central6.5MEDIUMServer-side Request Forgery Vulnerability in Trend Micro Apex Central
CVE-2025-30678Trend MicroTrend Micro Apex Central6.5MEDIUMUncontrolled Search Path Vulnerability in Trend Micro Worry-Free Business Security Services
CVE-2025-49487Trend MicroTrend Micro Worry-free...6.8MEDIUMUncontrolled Search Path Vulnerability in Trend Micro Apex One Security Agent
CVE-2025-49158Trend MicroTrend Micro Apex One6.7MEDIUMLocal Privilege Escalation Risk in Trend Micro Apex One Damage Cleanup Engine
CVE-2025-49157Trend MicroTrend Micro Apex One7.8HIGHLocal Privilege Escalation Vulnerability in Trend Micro Apex One
CVE-2025-49156Trend MicroTrend Micro Apex One7HIGHUncontrolled Search Path Vulnerability in Trend Micro Apex One Data Loss Prevention Module
CVE-2025-49155Trend MicroTrend Micro Apex One8.8HIGHInsecure Access Control in Trend Micro Apex One and Worry-Free Business Security
CVE-2025-49154Trend MicroTrend Micro Apex One8.7HIGHInsecure Deserialization Vulnerability in Trend Micro Apex Central
CVE-2025-49220Trend MicroTrend Micro Apex Central9.8CRITICALInsecure Deserialization Vulnerability in Trend Micro Apex Central
CVE-2025-49219Trend MicroTrend Micro Apex Central9.8CRITICAL