Lucene search

K

Antivirus + Security Security Vulnerabilities

cve
cve

CVE-2018-10513

A Deserialization of Untrusted Data Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in o...

7.8CVSS

8.7AI Score

0.0004EPSS

2018-08-30 07:29 PM
24
cve
cve

CVE-2018-10514

A Missing Impersonation Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to expl...

7.8CVSS

8.7AI Score

0.0004EPSS

2018-08-30 07:29 PM
33
cve
cve

CVE-2018-15363

An Out-of-Bounds Read Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploi...

7.8CVSS

8.8AI Score

0.0004EPSS

2018-08-30 07:29 PM
18
cve
cve

CVE-2018-18333

A DLL hijacking vulnerability in Trend Micro Security 2019 (Consumer) versions below 15.0.0.1163 and below could allow an attacker to manipulate a specific DLL and escalate privileges on vulnerable installations.

7.8CVSS

7.6AI Score

0.003EPSS

2019-02-05 10:29 PM
19
2
cve
cve

CVE-2018-3608

A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes.

9.8CVSS

9.3AI Score

0.025EPSS

2018-07-06 07:29 PM
22
cve
cve

CVE-2024-23940

Trend Micro uiAirSupport, included in the Trend Micro Security 2023 family of consumer products, version 6.0.2092 and below is vulnerable to a DLL hijacking/proxying vulnerability, which if exploited could allow an attacker to impersonate and modify a library to execute code on the system and ultim...

7.8CVSS

7.8AI Score

0.001EPSS

2024-01-29 07:15 PM
16