Show filters
22 Total Results
Displaying 11-20 of 22
Sort by:
Attacker Value
Unknown

CVE-2020-25777

Disclosure Date: October 14, 2020 (last updated November 28, 2024)
Trend Micro Antivirus for Mac 2020 (Consumer) is vulnerable to a specific kernel extension request attack where an attacker could bypass the Web Threat Protection feature of the product. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Attacker Value
Unknown

CVE-2020-25776

Disclosure Date: October 02, 2020 (last updated February 22, 2025)
Trend Micro Antivirus for Mac 2020 (Consumer) is vulnerable to a symbolic link privilege escalation attack where an attacker could exploit a critical file on the system to escalate their privileges. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2020-25775

Disclosure Date: September 29, 2020 (last updated February 22, 2025)
The Trend Micro Security 2020 (v16) consumer family of products is vulnerable to a security race condition arbitrary file deletion vulnerability that could allow an unprivileged user to manipulate the product's secure erase feature to delete files with a higher set of privileges.
Attacker Value
Unknown

CVE-2020-15603

Disclosure Date: July 15, 2020 (last updated February 21, 2025)
An invalid memory read vulnerability in a Trend Micro Secuity 2020 (v16.0.0.1302 and below) consumer family of products' driver could allow an attacker to manipulate the specific driver to do a system call operation with an invalid address, resulting in a potential system crash.
Attacker Value
Unknown

CVE-2020-15602

Disclosure Date: July 15, 2020 (last updated February 21, 2025)
An untrusted search path remote code execution (RCE) vulnerability in the Trend Micro Secuity 2020 (v16.0.0.1146 and below) consumer family of products could allow an attacker to run arbitrary code on a vulnerable system. As the Trend Micro installer tries to load DLL files from its current directory, an arbitrary DLL could also be loaded with the same privileges as the installer if run as Administrator. User interaction is required to exploit the vulnerbaility in that the target must open a malicious directory or device.
Attacker Value
Unknown

CVE-2020-8103

Disclosure Date: June 05, 2020 (last updated February 21, 2025)
A vulnerability in the improper handling of symbolic links in Bitdefender Antivirus Free can allow an unprivileged user to substitute a quarantined file, and restore it to a privileged location. This issue affects Bitdefender Antivirus Free versions prior to 1.0.17.178.
Attacker Value
Unknown

CVE-2020-8099

Disclosure Date: April 21, 2020 (last updated February 21, 2025)
A vulnerability in the improper handling of junctions in Bitdefender Antivirus Free can allow an unprivileged user to substitute a quarantined file, and restore it to a privileged location. This issue affects: Bitdefender Antivirus Free versions prior to 1.0.17.
Attacker Value
Unknown

CVE-2019-19693

Disclosure Date: December 20, 2019 (last updated November 27, 2024)
The Trend Micro Security 2020 consumer family of products contains a vulnerability that could allow a local attacker to disclose sensitive information or to create a denial-of-service condition on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2019-18190

Disclosure Date: December 09, 2019 (last updated November 27, 2024)
Trend Micro Security (Consumer) 2020 (v16.x) is affected by a vulnerability in where null pointer dereference errors result in the crash of application, which could potentially lead to possible unsigned code execution under certain circumstances.
Attacker Value
Unknown

CVE-2019-15628

Disclosure Date: December 02, 2019 (last updated November 27, 2024)
Trend Micro Security (Consumer) 2020 (v16.0.1221 and below) is affected by a DLL hijacking vulnerability that could allow an attacker to use a specific service as an execution and/or persistence mechanism which could execute a malicious program each time the service is started.