Show filters
595 Total Results
Displaying 131-140 of 595
Sort by:
Attacker Value
Unknown

CVE-2018-16720

Disclosure Date: November 23, 2020 (last updated February 22, 2025)
In Jingyun Antivirus v2.4.2.39, the driver file (ZySandbox.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x1236001c, a related issue to CVE-2018-16304.
Attacker Value
Unknown

CVE-2018-16721

Disclosure Date: November 23, 2020 (last updated February 22, 2025)
In Jingyun Antivirus v2.4.2.39, the driver file (ZySandbox.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x12360090, a related issue to CVE-2018-16306.
Attacker Value
Unknown

CVE-2018-16722

Disclosure Date: November 23, 2020 (last updated February 22, 2025)
In Jingyun Antivirus v2.4.2.39, the driver file (ZySandbox.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x12360094, a related issue to CVE-2018-16305.
Attacker Value
Unknown

CVE-2020-27697

Disclosure Date: November 18, 2020 (last updated February 22, 2025)
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a non-protected location with high privileges (symlink attack) which can lead to obtaining administrative privileges during the installation of the product.
Attacker Value
Unknown

CVE-2020-27695

Disclosure Date: November 18, 2020 (last updated February 22, 2025)
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a malicious DLL in a local directory which can lead to obtaining administrative privileges during the installation of the product.
Attacker Value
Unknown

CVE-2020-27696

Disclosure Date: November 18, 2020 (last updated November 28, 2024)
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a specific Windows system directory which can lead to obtaining administrative privileges during the installation of the product.
Attacker Value
Unknown

CVE-2020-27014

Disclosure Date: October 30, 2020 (last updated February 22, 2025)
Trend Micro Antivirus for Mac 2020 (Consumer) contains a race condition vulnerability in the Web Threat Protection Blocklist component, that if exploited, could allow an attacker to case a kernel panic or crash.\n\n\r\nAn attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2020-27015

Disclosure Date: October 30, 2020 (last updated February 22, 2025)
Trend Micro Antivirus for Mac 2020 (Consumer) contains an Error Message Information Disclosure vulnerability that if exploited, could allow kernel pointers and debug messages to leak to userland. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2020-25778

Disclosure Date: October 14, 2020 (last updated February 22, 2025)
Trend Micro Antivirus for Mac 2020 (Consumer) has a vulnerability in a specific kernel extension where an attacker could supply a kernel pointer and leak several bytes of memory. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2020-27013

Disclosure Date: October 14, 2020 (last updated November 28, 2024)
Trend Micro Antivirus for Mac 2020 (Consumer) contains a vulnerability in the product that occurs when a webserver is started that implements an API with several properties that can be read and written to allowing the attacker to gather and modify sensitive product and user data. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.