Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro antivirus 2020 vulnerabilities and exploits
(subscribe to this query)
5.8
CVSSv2
CVE-2020-25777
Trend Micro Antivirus for Mac 2020 (Consumer) is vulnerable to a specific kernel extension request attack where an attacker could bypass the Web Threat Protection feature of the product. User interaction is required to exploit this vulnerability in that the target must visit a ma...
Trendmicro Antivirus 2019
Trendmicro Antivirus 2020
2.1
CVSSv2
CVE-2020-25778
Trend Micro Antivirus for Mac 2020 (Consumer) has a vulnerability in a specific kernel extension where an attacker could supply a kernel pointer and leak several bytes of memory. An attacker must first obtain the ability to execute high-privileged code on the target system in ord...
Trendmicro Antivirus 2019
Trendmicro Antivirus 2020
7.2
CVSSv2
CVE-2020-25776
Trend Micro Antivirus for Mac 2020 (Consumer) is vulnerable to a symbolic link privilege escalation attack where an attacker could exploit a critical file on the system to escalate their privileges. An attacker must first obtain the ability to execute low-privileged code on the t...
Trendmicro Antivirus 2019
Trendmicro Antivirus 2020
2.1
CVSSv2
CVE-2020-27015
Trend Micro Antivirus for Mac 2020 (Consumer) contains an Error Message Information Disclosure vulnerability that if exploited, could allow kernel pointers and debug messages to leak to userland. An attacker must first obtain the ability to execute high-privileged code on the tar...
Trendmicro Antivirus 2020
3.6
CVSSv2
CVE-2020-27013
Trend Micro Antivirus for Mac 2020 (Consumer) contains a vulnerability in the product that occurs when a webserver is started that implements an API with several properties that can be read and written to allowing the malicious user to gather and modify sensitive product and user...
Trendmicro Antivirus 2020
2.1
CVSSv2
CVE-2020-25779
Trend Micro Antivirus for Mac 2020 (Consumer) has a vulnerability in which a Internationalized Domain Name homograph attack (Puny-code) could be used to add a malicious website to the approved websites list of Trend Micro Antivirus for Mac to bypass the web threat protection feat...
Trendmicro Antivirus 2020
6.9
CVSSv2
CVE-2020-27014
Trend Micro Antivirus for Mac 2020 (Consumer) contains a race condition vulnerability in the Web Threat Protection Blocklist component, that if exploited, could allow an malicious user to case a kernel panic or crash.\n\n\r\nAn attacker must first obtain the ability to execute hi...
Trendmicro Antivirus 2020
6.9
CVSSv2
CVE-2020-27696
Trend Micro Security 2020 (Consumer) contains a vulnerability in the installer package that could be exploited by placing a specific Windows system directory which can lead to obtaining administrative privileges during the installation of the product.
Trendmicro Antivirus\\+ Security 2020
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
6.3
CVSSv2
CVE-2020-25775
The Trend Micro Security 2020 (v16) consumer family of products is vulnerable to a security race condition arbitrary file deletion vulnerability that could allow an unprivileged user to manipulate the product's secure erase feature to delete files with a higher set of privil...
Trendmicro Antivirus\\+ 2020
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
6.9
CVSSv2
CVE-2020-15602
An untrusted search path remote code execution (RCE) vulnerability in the Trend Micro Secuity 2020 (v16.0.0.1146 and below) consumer family of products could allow an malicious user to run arbitrary code on a vulnerable system. As the Trend Micro installer tries to load DLL files...
Trendmicro Antivirus\\+ 2020
Trendmicro Internet Security 2020
Trendmicro Maximum Security 2020
Trendmicro Premium Security 2020
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »