Trend Micro Maximum Security 2020 16.0.1221

CPE Details

Trend Micro Maximum Security 2020 16.0.1221
16.0.1221
2020-01-14
15h28 +00:00
2020-01-14
15h28 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:trendmicro:maximum_security_2020:16.0.1221:*:*:*:*:*:*:*

Informations

Vendor

trendmicro

Product

maximum_security_2020

Version

16.0.1221

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-15603 2020-07-15 17h15 +00:00 An invalid memory read vulnerability in a Trend Micro Secuity 2020 (v16.0.0.1302 and below) consumer family of products' driver could allow an attacker to manipulate the specific driver to do a system call operation with an invalid address, resulting in a potential system crash.
7.5
Haute
CVE-2019-19693 2019-12-20 03h05 +00:00 The Trend Micro Security 2020 consumer family of products contains a vulnerability that could allow a local attacker to disclose sensitive information or to create a denial-of-service condition on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
7.1
Haute
CVE-2019-18190 2019-12-09 17h50 +00:00 Trend Micro Security (Consumer) 2020 (v16.x) is affected by a vulnerability in where null pointer dereference errors result in the crash of application, which could potentially lead to possible unsigned code execution under certain circumstances.
9.8
Critique
CVE-2019-15628 2019-12-02 14h45 +00:00 Trend Micro Security (Consumer) 2020 (v16.0.1221 and below) is affected by a DLL hijacking vulnerability that could allow an attacker to use a specific service as an execution and/or persistence mechanism which could execute a malicious program each time the service is started.
7.8
Haute