Trend Micro Antivirus + Security 12.0

CPE Details

Trend Micro Antivirus + Security 12.0
12.0
2020-08-26
18h00 +00:00
2020-08-26
18h00 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:trendmicro:antivirus_\+_security:12.0:*:*:*:*:*:*:*

Informations

Vendor

trendmicro

Product

antivirus_\+_security

Version

12.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2018-18333 2019-02-05 21h00 +00:00 A DLL hijacking vulnerability in Trend Micro Security 2019 (Consumer) versions below 15.0.0.1163 and below could allow an attacker to manipulate a specific DLL and escalate privileges on vulnerable installations.
7.8
Haute
CVE-2018-10513 2018-08-30 17h00 +00:00 A Deserialization of Untrusted Data Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.
7.8
Haute
CVE-2018-10514 2018-08-30 17h00 +00:00 A Missing Impersonation Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.
7.8
Haute
CVE-2018-15363 2018-08-30 17h00 +00:00 An Out-of-Bounds Read Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.
7.8
Haute
CVE-2018-3608 2018-07-06 17h00 +00:00 A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes.
9.8
Critique