Trend Micro Deep Security 10.0

CPE Details

Trend Micro Deep Security 10.0
10.0
2021-08-27 11:57 +00:00
2022-04-25 14:46 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:a:trendmicro:deep_security:10.0:-:*:*:*:*:*:*

Informations

Vendor

trendmicro

Product

deep_security

Version

10.0

Update

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-25252 2021-03-03 14:43 +00:00 Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.
5.5
MEDIUM
CVE-2020-8607 2020-08-05 12:05 +00:00 An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
6.7
MEDIUM
CVE-2019-15627 2019-10-17 17:09 +00:00 Versions 10.0, 11.0 and 12.0 of the Trend Micro Deep Security Agent are vulnerable to an arbitrary file delete attack, which may lead to availability impact. Local OS access is required. Please note that only Windows agents are affected.
7.1
HIGH
CVE-2019-15626 2019-10-17 17:09 +00:00 The Deep Security Manager application (Versions 10.0, 11.0 and 12.0), when configured in a certain way, may transmit initial LDAP communication in clear text. This may result in confidentiality impact but does not impact integrity or availability.
7.5
HIGH
CVE-2018-6218 2018-02-16 21:00 +00:00 A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an attacker to run arbitrary code on a vulnerable system.
7
HIGH
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.