Show filters
48 Total Results
Displaying 11-20 of 48
Sort by:
Attacker Value
Unknown

CVE-2022-28964

Disclosure Date: May 20, 2022 (last updated October 07, 2023)
An arbitrary file write vulnerability in Avast Premium Security before v21.11.2500 (build 21.11.6809.528) allows attackers to cause a Denial of Service (DoS) via a crafted DLL file.
Attacker Value
Unknown

CVE-2022-24618

Disclosure Date: March 10, 2022 (last updated October 07, 2023)
Heimdal.Wizard.exe installer in Heimdal Premium Security 2.5.395 and earlier has insecure permissions, which allows unprivileged local users to elevate privileges to SYSTEM via the "Browse For Folder" window accessible by triggering a "Repair" on the MSI package located in C:\Windows\Installer.
Attacker Value
Unknown

CVE-2021-44023

Disclosure Date: December 16, 2021 (last updated October 07, 2023)
A link following denial-of-service (DoS) vulnerability in the Trend Micro Security (Consumer) 2021 familiy of products could allow an attacker to abuse the PC Health Checkup feature of the product to create symlinks that would allow modification of files which could lead to a denial-of-service.
Attacker Value
Unknown

CVE-2021-43772

Disclosure Date: December 03, 2021 (last updated October 07, 2023)
Trend Micro Security 2021 v17.0 (Consumer) contains a vulnerability that allows files inside the protected folder to be modified without any detection.
Attacker Value
Unknown

CVE-2021-27241

Disclosure Date: March 29, 2021 (last updated February 22, 2025)
This vulnerability allows local attackers to delete arbitrary directories on affected installations of Avast Premium Security 20.8.2429 (Build 20.8.5653.561). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the AvastSvc.exe module. By creating a directory junction, an attacker can abuse the service to delete a directory. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12082.
Attacker Value
Unknown

CVE-2021-25251

Disclosure Date: February 10, 2021 (last updated February 22, 2025)
The Trend Micro Security 2020 and 2021 families of consumer products are vulnerable to a code injection vulnerability which could allow an attacker to disable the program's password protection and disable protection. An attacker must already have administrator privileges on the machine to exploit this vulnerability.
Attacker Value
Unknown

CVE-2020-27697

Disclosure Date: November 18, 2020 (last updated February 22, 2025)
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a non-protected location with high privileges (symlink attack) which can lead to obtaining administrative privileges during the installation of the product.
Attacker Value
Unknown

CVE-2020-27695

Disclosure Date: November 18, 2020 (last updated February 22, 2025)
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a local directory which can lead to obtaining administrative privileges during the installation of the product.
Attacker Value
Unknown

CVE-2020-27696

Disclosure Date: November 18, 2020 (last updated November 28, 2024)
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a specific Windows system directory which can lead to obtaining administrative privileges during the installation of the product.
Attacker Value
Unknown

CVE-2020-25775

Disclosure Date: September 29, 2020 (last updated February 22, 2025)
The Trend Micro Security 2020 (v16) consumer family of products is vulnerable to a security race condition arbitrary file deletion vulnerability that could allow an unprivileged user to manipulate the product's secure erase feature to delete files with a higher set of privileges.