Show filters
48 Total Results
Displaying 11-20 of 48
Sort by:
Attacker Value
Unknown
CVE-2022-28964
Disclosure Date: May 20, 2022 (last updated October 07, 2023)
An arbitrary file write vulnerability in Avast Premium Security before v21.11.2500 (build 21.11.6809.528) allows attackers to cause a Denial of Service (DoS) via a crafted DLL file.
0
Attacker Value
Unknown
CVE-2022-24618
Disclosure Date: March 10, 2022 (last updated October 07, 2023)
Heimdal.Wizard.exe installer in Heimdal Premium Security 2.5.395 and earlier has insecure permissions, which allows unprivileged local users to elevate privileges to SYSTEM via the "Browse For Folder" window accessible by triggering a "Repair" on the MSI package located in C:\Windows\Installer.
0
Attacker Value
Unknown
CVE-2021-44023
Disclosure Date: December 16, 2021 (last updated October 07, 2023)
A link following denial-of-service (DoS) vulnerability in the Trend Micro Security (Consumer) 2021 familiy of products could allow an attacker to abuse the PC Health Checkup feature of the product to create symlinks that would allow modification of files which could lead to a denial-of-service.
0
Attacker Value
Unknown
CVE-2021-43772
Disclosure Date: December 03, 2021 (last updated October 07, 2023)
Trend Micro Security 2021 v17.0 (Consumer) contains a vulnerability that allows files inside the protected folder to be modified without any detection.
0
Attacker Value
Unknown
CVE-2021-27241
Disclosure Date: March 29, 2021 (last updated February 22, 2025)
This vulnerability allows local attackers to delete arbitrary directories on affected installations of Avast Premium Security 20.8.2429 (Build 20.8.5653.561). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the AvastSvc.exe module. By creating a directory junction, an attacker can abuse the service to delete a directory. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12082.
0
Attacker Value
Unknown
CVE-2021-25251
Disclosure Date: February 10, 2021 (last updated February 22, 2025)
The Trend Micro Security 2020 and 2021 families of consumer products are vulnerable to a code injection vulnerability which could allow an attacker to disable the program's password protection and disable protection. An attacker must already have administrator privileges on the machine to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2020-27697
Disclosure Date: November 18, 2020 (last updated February 22, 2025)
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a non-protected location with high privileges (symlink attack) which can lead to obtaining administrative privileges during the installation of the product.
0
Attacker Value
Unknown
CVE-2020-27695
Disclosure Date: November 18, 2020 (last updated February 22, 2025)
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a local directory which can lead to obtaining administrative privileges during the installation of the product.
0
Attacker Value
Unknown
CVE-2020-27696
Disclosure Date: November 18, 2020 (last updated November 28, 2024)
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a specific Windows system directory which can lead to obtaining administrative privileges during the installation of the product.
0
Attacker Value
Unknown
CVE-2020-25775
Disclosure Date: September 29, 2020 (last updated February 22, 2025)
The Trend Micro Security 2020 (v16) consumer family of products is vulnerable to a security race condition arbitrary file deletion vulnerability that could allow an unprivileged user to manipulate the product's secure erase feature to delete files with a higher set of privileges.
0