Lucene search

K

6 matches found

CVE
CVE
added 2020/09/29 12:15 a.m.41 views

CVE-2020-25775

The Trend Micro Security 2020 (v16) consumer family of products is vulnerable to a security race condition arbitrary file deletion vulnerability that could allow an unprivileged user to manipulate the product's secure erase feature to delete files with a higher set of privileges.

6.3CVSS6.3AI score0.00062EPSS
CVE
CVE
added 2020/11/18 7:15 p.m.40 views

CVE-2020-27696

Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a specific Windows system directory which can lead to obtaining administrative privileges during the installation of the product.

7.8CVSS7.5AI score0.00065EPSS
CVE
CVE
added 2020/07/15 8:15 p.m.39 views

CVE-2020-15602

An untrusted search path remote code execution (RCE) vulnerability in the Trend Micro Secuity 2020 (v16.0.0.1146 and below) consumer family of products could allow an attacker to run arbitrary code on a vulnerable system. As the Trend Micro installer tries to load DLL files from its current directo...

7.8CVSS7.9AI score0.0038EPSS
CVE
CVE
added 2020/07/15 8:15 p.m.38 views

CVE-2020-15603

An invalid memory read vulnerability in a Trend Micro Secuity 2020 (v16.0.0.1302 and below) consumer family of products' driver could allow an attacker to manipulate the specific driver to do a system call operation with an invalid address, resulting in a potential system crash.

7.8CVSS7.3AI score0.00533EPSS
CVE
CVE
added 2020/11/18 7:15 p.m.34 views

CVE-2020-27695

Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a local directory which can lead to obtaining administrative privileges during the installation of the product.

7.8CVSS7.4AI score0.00065EPSS
CVE
CVE
added 2020/11/18 7:15 p.m.31 views

CVE-2020-27697

Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a non-protected location with high privileges (symlink attack) which can lead to obtaining administrative privileges during the installation of the product.

7.8CVSS7.5AI score0.00051EPSS