All the vulnerabilites related to Trend Micro, Inc. - Antivirus+
jvndb-2020-007305
Vulnerability from jvndb
Published
2024-08-22 11:33
Modified
2024-08-22 11:33
Severity ?
Summary
Installer of Trend Micro Security 2020 (Consumer) may insecurely load Dynamic Link Libraries
Details
Installers of Trend Micro Security 2020 (Consumer) family may insecurely load Dynamic Link Libraries. Multiple products provided by Trend Micro Incorporated contain the DLL search path issue, which may lead to insecurely loading Dynamic Link Libraries (CWE-427). Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-007305.html",
  "dc:date": "2024-08-22T11:33+09:00",
  "dcterms:issued": "2024-08-22T11:33+09:00",
  "dcterms:modified": "2024-08-22T11:33+09:00",
  "description": "Installers of Trend Micro Security 2020 (Consumer) family may insecurely load Dynamic Link Libraries.\r\n\r\nMultiple products provided by Trend Micro Incorporated contain the DLL search path issue, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).\r\n\r\nTrend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.",
  "link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-007305.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:trendmicro:antivirus%2B",
      "@product": "Antivirus+",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:internet_security_2020",
      "@product": "Internet Security 2020",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:maximum_security_2020",
      "@product": "Trend Micro Maximum Security 2020",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:premium_security_2020",
      "@product": "Trend Micro Premium Security 2020",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "7.8",
    "@severity": "High",
    "@type": "Base",
    "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
    "@version": "3.0"
  },
  "sec:identifier": "JVNDB-2020-007305",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/vu/JVNVU98423028/index.html",
      "@id": "JVNVU#98423028",
      "@source": "JVN"
    },
    {
      "#text": "https://jvn.jp/en/ta/JVNTA91240916/index.html",
      "@id": "JVNTA#91240916",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15602",
      "@id": "CVE-2020-15602",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2020-15602",
      "@id": "CVE-2020-15602",
      "@source": "NVD"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/426.html",
      "@id": "CWE-426",
      "@title": "Untrusted Search Path(CWE-426)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/427.html",
      "@id": "CWE-427",
      "@title": "Uncontrolled Search Path Element(CWE-427)"
    }
  ],
  "title": "Installer of Trend Micro Security 2020 (Consumer) may insecurely load Dynamic Link Libraries"
}

jvndb-2021-001122
Vulnerability from jvndb
Published
2021-03-08 17:26
Modified
2021-03-08 17:26
Severity ?
Summary
Trend Micro Security (Consumer) vulnerable to code injection
Details
Trend Micro Security (Consumer) provided by Trend Micro Incorporated contains a code injection vulnerability (CWE-94). Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solutions through JVN.
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-001122.html",
  "dc:date": "2021-03-08T17:26+09:00",
  "dcterms:issued": "2021-03-08T17:26+09:00",
  "dcterms:modified": "2021-03-08T17:26+09:00",
  "description": "Trend Micro Security (Consumer) provided by Trend Micro Incorporated contains a code injection vulnerability (CWE-94).\r\n\r\nTrend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solutions through JVN.",
  "link": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-001122.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:trendmicro:antivirus%2B",
      "@product": "Antivirus+",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:internet_security",
      "@product": "Internet Security",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:maximum_security",
      "@product": "Trend Micro Maximum Security",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:premium_security",
      "@product": "Trend Micro Premium Security",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": [
    {
      "@score": "6.5",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "@version": "2.0"
    },
    {
      "@score": "7.2",
      "@severity": "High",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2021-001122",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/vu/JVNVU99545969/",
      "@id": "JVNVU#99545969",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25251",
      "@id": "CVE-2021-25251",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-25251",
      "@id": "CVE-2021-25251",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-94",
      "@title": "Code Injection(CWE-94)"
    }
  ],
  "title": "Trend Micro Security (Consumer) vulnerable to code injection"
}

jvndb-2020-007306
Vulnerability from jvndb
Published
2024-08-20 17:52
Modified
2024-08-20 17:52
Severity ?
Summary
Trend Micro Security (Consumer) Driver vulnerable to Out-of-bounds Read
Details
Trend Micro Security (Consumer) Driver is vulnerable to Out-of-bounds Read. Multiple products provided by Trend Micro Incorporated contain Out-of-bounds Read vulnerability (CWE-125). Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-007306.html",
  "dc:date": "2024-08-20T17:52+09:00",
  "dcterms:issued": "2024-08-20T17:52+09:00",
  "dcterms:modified": "2024-08-20T17:52+09:00",
  "description": "Trend Micro Security (Consumer) Driver is vulnerable to Out-of-bounds Read.\r\n\r\nMultiple products provided by Trend Micro Incorporated contain Out-of-bounds Read vulnerability (CWE-125).\r\n\r\nTrend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.",
  "link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-007306.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:trendmicro:antivirus%2B",
      "@product": "Antivirus+",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:internet_security_2020",
      "@product": "Internet Security 2020",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:maximum_security_2020",
      "@product": "Trend Micro Maximum Security 2020",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:premium_security_2020",
      "@product": "Trend Micro Premium Security 2020",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "6.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
    "@version": "3.0"
  },
  "sec:identifier": "JVNDB-2020-007306",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/vu/JVNVU94105662/",
      "@id": "JVNVU#94105662",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15603",
      "@id": "CVE-2020-15603",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2020-15603",
      "@id": "CVE-2020-15603",
      "@source": "NVD"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/125.html",
      "@id": "CWE-125",
      "@title": "Out-of-bounds Read(CWE-125)"
    }
  ],
  "title": "Trend Micro Security (Consumer) Driver vulnerable to Out-of-bounds Read"
}