Lucene search

K
TrendmicroAntivirus+ Security 2020

6 matches found

CVE
CVE
added 2021/02/10 10:15 p.m.49 views

CVE-2021-25251

The Trend Micro Security 2020 and 2021 families of consumer products are vulnerable to a code injection vulnerability which could allow an attacker to disable the program's password protection and disable protection. An attacker must already have administrator privileges on the machine to exploit t...

7.2CVSS7.1AI score0.00862EPSS
CVE
CVE
added 2019/12/20 4:15 p.m.43 views

CVE-2019-19693

The Trend Micro Security 2020 consumer family of products contains a vulnerability that could allow a local attacker to disclose sensitive information or to create a denial-of-service condition on affected installations. An attacker must first obtain the ability to execute low-privileged code on th...

7.1CVSS6.7AI score0.00175EPSS
CVE
CVE
added 2020/11/18 7:15 p.m.40 views

CVE-2020-27696

Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a specific Windows system directory which can lead to obtaining administrative privileges during the installation of the product.

7.8CVSS7.5AI score0.00065EPSS
CVE
CVE
added 2020/11/18 7:15 p.m.34 views

CVE-2020-27695

Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a local directory which can lead to obtaining administrative privileges during the installation of the product.

7.8CVSS7.4AI score0.00065EPSS
CVE
CVE
added 2019/12/09 7:15 p.m.32 views

CVE-2019-18190

Trend Micro Security (Consumer) 2020 (v16.x) is affected by a vulnerability in where null pointer dereference errors result in the crash of application, which could potentially lead to possible unsigned code execution under certain circumstances.

9.8CVSS9.4AI score0.00734EPSS
CVE
CVE
added 2020/11/18 7:15 p.m.31 views

CVE-2020-27697

Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a non-protected location with high privileges (symlink attack) which can lead to obtaining administrative privileges during the installation of the product.

7.8CVSS7.5AI score0.00051EPSS