Trend Micro Maximum Security 2021 17.0

CPE Details

Trend Micro Maximum Security 2021 17.0
17.0
2021-02-11
15h44 +00:00
2021-06-01
16h51 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:trendmicro:maximum_security_2021:17.0:*:*:*:*:*:*:*

Informations

Vendor

trendmicro

Product

maximum_security_2021

Version

17.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-28929 2023-06-26 21h52 +00:00 Trend Micro Security 2021, 2022, and 2023 (Consumer) are vulnerable to a DLL Hijacking vulnerability which could allow an attacker to use a specific executable file as an execution and/or persistence mechanism which could execute a malicious program each time the executable file is started.
7.8
Haute
CVE-2021-44023 2021-12-16 01h28 +00:00 A link following denial-of-service (DoS) vulnerability in the Trend Micro Security (Consumer) 2021 familiy of products could allow an attacker to abuse the PC Health Checkup feature of the product to create symlinks that would allow modification of files which could lead to a denial-of-service.
7.1
Haute
CVE-2021-36744 2021-09-06 09h37 +00:00 Trend Micro Security (Consumer) 2021 and 2020 are vulnerable to a directory junction vulnerability which could allow an attacker to exploit the system to escalate privileges and create a denial of service.
7.8
Haute
CVE-2021-32460 2021-06-03 08h32 +00:00 The Trend Micro Maximum Security 2021 (v17) consumer product is vulnerable to an improper access control vulnerability in the installer which could allow a local attacker to escalate privileges on a target machine. Please note than an attacker must already have local user privileges and access on the machine to exploit this vulnerability.
7.8
Haute
CVE-2021-25251 2021-02-10 21h00 +00:00 The Trend Micro Security 2020 and 2021 families of consumer products are vulnerable to a code injection vulnerability which could allow an attacker to disable the program's password protection and disable protection. An attacker must already have administrator privileges on the machine to exploit this vulnerability.
7.2
Haute