The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Trend Micro OfficeScan XG

Trend Micro OfficeScan: two vulnerabilities
An attacker can use several vulnerabilities of Trend Micro OfficeScan...
1117769, CVE-2017-11393, CVE-2017-11394, trendmicro_imsva_widget_exec.rb, trendmicro_officescan_widget_exec.rb, VIGILANCE-VUL-23420, ZDI-17-521, ZDI-17-522
Trend Micro OfficeScan: two vulnerabilities
An attacker can use several vulnerabilities of Trend Micro OfficeScan...
1117204, CVE-2017-5481, CVE-2017-8801, VIGILANCE-VUL-22564
Antivirus: privilege escalation via Microsoft Application Verifier
An attacker can bypass restrictions via Microsoft Application Verifier of Antivirus, in order to escalate his privileges...
1116957, CVE-2017-5565, CVE-2017-5566, CVE-2017-5567, CVE-2017-6186, CVE-2017-6417, VIGILANCE-VUL-22211
Trend Micro OfficeScan: directory traversal
An attacker can traverse directories of Trend Micro OfficeScan, in order to read a file outside the service root path...
1114097, 2016-0116, VIGILANCE-VUL-20798
Trend Micro OfficeScan: directory traversal
An attacker can traverse directories of Trend Micro Office Scan, in order to read a file outside the service root path...
CVE-2016-1223, JVN#48847535, VIGILANCE-VUL-19940
Trend Micro: code execution via Password Manager
An attacker can invite the victim to display a web document containing a malicious url, in order to run code in Password Manager of Trend Micro...
VIGILANCE-VUL-18694
Windows: code execution during application installation
An attacker can invite the victim to download malicious libraries on Windows, in order to run code during the installation of an application requiring these DLL...
sk110055, VIGILANCE-VUL-18671
OpenSSL: information disclosure via Heartbeat
An attacker can use the Heartbeat protocol on an application compiled with OpenSSL, in order to obtain sensitive information, such as keys stored in memory...
1669839, 190438, 2076225, 2962393, c04236102, c04267775, c04286049, CA20140413-01, CERTFR-2014-ALE-003, CERTFR-2014-AVI-156, CERTFR-2014-AVI-161, CERTFR-2014-AVI-162, CERTFR-2014-AVI-167, CERTFR-2014-AVI-169, CERTFR-2014-AVI-177, CERTFR-2014-AVI-178, CERTFR-2014-AVI-179, CERTFR-2014-AVI-180, CERTFR-2014-AVI-181, CERTFR-2014-AVI-198, CERTFR-2014-AVI-199, CERTFR-2014-AVI-213, cisco-sa-20140409-heartbleed, CTX140605, CVE-2014-0160, CVE-2014-0346-REJECT, DSA-2896-1, DSA-2896-2, emr_na-c04236102-7, ESA-2014-034, ESA-2014-036, ESA-2014-075, FEDORA-2014-4879, FEDORA-2014-4910, FEDORA-2014-4982, FEDORA-2014-4999, FG-IR-14-011, FreeBSD-SA-14:06.openssl, Heartbleed, HPSBMU02995, HPSBMU03025, HPSBMU03040, ICSA-14-105-03, JSA10623, MDVSA-2014:123, MDVSA-2015:062, NetBSD-SA2014-004, openSUSE-SU-2014:0492-1, openSUSE-SU-2014:0560-1, openSUSE-SU-2014:0719-1, pfSense-SA-14_04.openssl, RHSA-2014:0376-01, RHSA-2014:0377-01, RHSA-2014:0378-01, RHSA-2014:0396-01, RHSA-2014:0416-01, SA40005, SA79, SB10071, SOL15159, SPL-82696, SSA:2014-098-01, SSA-635659, SSRT101565, USN-2165-1, VIGILANCE-VUL-14534, VMSA-2014-0004, VMSA-2014-0004.1, VMSA-2014-0004.2, VMSA-2014-0004.3, VMSA-2014-0004.6, VMSA-2014-0004.7, VU#720951
TrendMicro antivirus: bypassing via CAB, RAR, TAR, ZIP
An attacker can create an archive containing a virus, which is not detected by TrendMicro antivirus...
BID-52580, BID-52603, BID-52608, BID-52610, BID-52612, BID-52621, BID-52623, BID-52626, CVE-2012-1425, CVE-2012-1443, CVE-2012-1448, CVE-2012-1453, CVE-2012-1456, CVE-2012-1457, CVE-2012-1459, CVE-2012-1461, VIGILANCE-VUL-11476
Trend Micro OfficeScan: privileges elevation via TMTDI
A local attacker can use a vulnerability of the TMTDI driver of Trend Micro OfficeScan, in order to gain system privileges...
BID-45034, VIGILANCE-VUL-10150
Our database contains other pages. You can request a free trial to read them.

Display information about Trend Micro OfficeScan XG: