Trend Micro OfficeScan Cloud 15

CPE Details

Trend Micro OfficeScan Cloud 15
15
2020-03-04
12h42 +00:00
2020-03-04
12h42 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:trendmicro:officescan_cloud:15:*:*:*:*:*:*:*

Informations

Vendor

trendmicro

Product

officescan_cloud

Version

15

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-24560 2020-09-23 23h50 +00:00 An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CWE-295: Improper server certificate verification in the communication with the update server.
7.5
Haute
CVE-2020-15604 2020-09-23 23h50 +00:00 An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CWE-494: Update files are not properly verified.
7.5
Haute
CVE-2020-8607 2020-08-05 12h05 +00:00 An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
6.7
Moyen
CVE-2019-19694 2020-02-20 21h50 +00:00 The Trend Micro Security 2019 (15.0.0.1163 and below) consumer family of products is vulnerable to a denial of service (DoS) attack in which a malicious actor could manipulate a key file at a certain time during the system startup process to disable the product's malware protection functions or the entire product completely..
4.7
Moyen