Vulnerabilities > Trendmicro > Mobile Security
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-06-26 | CVE-2023-32528 | Unspecified vulnerability in Trendmicro Mobile Security 9.8 Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable .php files that could allow a remote attacker to execute arbitrary code on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32527. | 8.8 |
2023-06-26 | CVE-2023-35695 | Information Exposure Through Log Files vulnerability in Trendmicro Mobile Security 9.8 A remote attacker could leverage a vulnerability in Trend Micro Mobile Security (Enterprise) 9.8 SP5 to download a particular log file which may contain sensitive information regarding the product. | 7.5 |
2022-09-19 | CVE-2022-40980 | Unspecified vulnerability in Trendmicro Mobile Security 9.8 A potential unathenticated file deletion vulnerabilty on Trend Micro Mobile Security for Enterprise 9.8 SP5 could allow an attacker with access to the Management Server to delete files. | 9.1 |
2020-02-20 | CVE-2019-14688 | Uncontrolled Search Path Element vulnerability in Trendmicro products Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. | 7.0 |
2019-12-18 | CVE-2019-19690 | Weak Password Requirements vulnerability in Trendmicro Mobile Security 10.3.1/9.7/9.8 Trend Micro Mobile Security for Android (Consumer) versions 10.3.1 and below on Android 8.0+ has an issue in which an attacker could bypass the product's App Password Protection feature. | 9.8 |
2018-01-19 | CVE-2017-14082 | Information Exposure vulnerability in Trendmicro Mobile Security 9.7 An uninitialized pointer information disclosure vulnerability in Trend Micro Mobile Security (Enterprise) versions 9.7 and below could allow an unauthenticated remote attacker to disclosure sensitive information on a vulnerable system. | 7.5 |
2017-09-22 | CVE-2017-14081 | Command Injection vulnerability in Trendmicro Mobile Security 9.7 Proxy command injection vulnerabilities in Trend Micro Mobile Security (Enterprise) versions before 9.7 Patch 3 allow remote attackers to execute arbitrary code on vulnerable installations. | 8.8 |
2017-09-22 | CVE-2017-14080 | Improper Authentication vulnerability in Trendmicro Mobile Security 9.7 Authentication bypass vulnerability in Trend Micro Mobile Security (Enterprise) versions before 9.7 Patch 3 allows attackers to access a specific part of the console using a blank password. | 9.8 |
2017-09-22 | CVE-2017-14079 | Unrestricted Upload of File with Dangerous Type vulnerability in Trendmicro Mobile Security 9.7 Unrestricted file uploads in Trend Micro Mobile Security (Enterprise) versions before 9.7 Patch 3 allow remote attackers to execute arbitrary code on vulnerable installations. | 8.8 |
2017-09-22 | CVE-2017-14078 | SQL Injection vulnerability in Trendmicro Mobile Security 9.7 SQL Injection vulnerabilities in Trend Micro Mobile Security (Enterprise) versions before 9.7 Patch 3 allow remote attackers to execute arbitrary code on vulnerable installations. | 9.8 |