All the vulnerabilites related to Trend Micro, Inc. - Trend Micro Maximum Security 2020
jvndb-2020-007305
Vulnerability from jvndb
Published
2024-08-22 11:33
Modified
2024-08-22 11:33
Severity ?
Summary
Installer of Trend Micro Security 2020 (Consumer) may insecurely load Dynamic Link Libraries
Details
Installers of Trend Micro Security 2020 (Consumer) family may insecurely load Dynamic Link Libraries.
Multiple products provided by Trend Micro Incorporated contain the DLL search path issue, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/vu/JVNVU98423028/index.html | |
JVN | https://jvn.jp/en/ta/JVNTA91240916/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15602 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2020-15602 | |
Untrusted Search Path(CWE-426) | https://cwe.mitre.org/data/definitions/426.html | |
Uncontrolled Search Path Element(CWE-427) | https://cwe.mitre.org/data/definitions/427.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-007305.html", "dc:date": "2024-08-22T11:33+09:00", "dcterms:issued": "2024-08-22T11:33+09:00", "dcterms:modified": "2024-08-22T11:33+09:00", "description": "Installers of Trend Micro Security 2020 (Consumer) family may insecurely load Dynamic Link Libraries.\r\n\r\nMultiple products provided by Trend Micro Incorporated contain the DLL search path issue, which may lead to insecurely loading Dynamic Link Libraries (CWE-427).\r\n\r\nTrend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-007305.html", "sec:cpe": [ { "#text": "cpe:/a:trendmicro:antivirus%2B", "@product": "Antivirus+", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:internet_security_2020", "@product": "Internet Security 2020", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:maximum_security_2020", "@product": "Trend Micro Maximum Security 2020", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:premium_security_2020", "@product": "Trend Micro Premium Security 2020", "@vendor": "Trend Micro, Inc.", "@version": "2.2" } ], "sec:cvss": { "@score": "7.8", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2020-007305", "sec:references": [ { "#text": "https://jvn.jp/en/vu/JVNVU98423028/index.html", "@id": "JVNVU#98423028", "@source": "JVN" }, { "#text": "https://jvn.jp/en/ta/JVNTA91240916/index.html", "@id": "JVNTA#91240916", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15602", "@id": "CVE-2020-15602", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2020-15602", "@id": "CVE-2020-15602", "@source": "NVD" }, { "#text": "https://cwe.mitre.org/data/definitions/426.html", "@id": "CWE-426", "@title": "Untrusted Search Path(CWE-426)" }, { "#text": "https://cwe.mitre.org/data/definitions/427.html", "@id": "CWE-427", "@title": "Uncontrolled Search Path Element(CWE-427)" } ], "title": "Installer of Trend Micro Security 2020 (Consumer) may insecurely load Dynamic Link Libraries" }
jvndb-2020-009590
Vulnerability from jvndb
Published
2020-11-19 18:03
Modified
2020-11-19 18:03
Severity ?
Summary
Trend Micro Security 2020 (Consumer) is vulnerable to arbitrary file deletion
Details
Trend Micro Security 2020 (Consumer) provided by Trend Micro Incorporated contains an arbitrary file deletion vulnerability that could allow an unprivileged user to manipulate the product's secure erase feature to delete files with a higher set of privileges.
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solutions through JVN.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-009590.html", "dc:date": "2020-11-19T18:03+09:00", "dcterms:issued": "2020-11-19T18:03+09:00", "dcterms:modified": "2020-11-19T18:03+09:00", "description": "Trend Micro Security 2020 (Consumer) provided by Trend Micro Incorporated contains an arbitrary file deletion vulnerability that could allow an unprivileged user to manipulate the product\u0027s secure erase feature to delete files with a higher set of privileges.\r\n\r\nTrend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solutions through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-009590.html", "sec:cpe": [ { "#text": "cpe:/a:trendmicro:antivirus%2b_security_2020", "@product": "Antivirus + Security 2020", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:internet_security_2020", "@product": "Internet Security 2020", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:maximum_security_2020", "@product": "Trend Micro Maximum Security 2020", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:premium_security_2020", "@product": "Trend Micro Premium Security 2020", "@vendor": "Trend Micro, Inc.", "@version": "2.2" } ], "sec:cvss": { "@score": "6.3", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2020-009590", "sec:references": [ { "#text": "https://jvn.jp/en/vu/JVNVU96249940", "@id": "JVNVU#96249940", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25775", "@id": "CVE-2020-25775", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2020-25775", "@id": "CVE-2020-25775", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-362", "@title": "Race Condition(CWE-362)" } ], "title": "Trend Micro Security 2020 (Consumer) is vulnerable to arbitrary file deletion" }
jvndb-2020-007306
Vulnerability from jvndb
Published
2024-08-20 17:52
Modified
2024-08-20 17:52
Severity ?
Summary
Trend Micro Security (Consumer) Driver vulnerable to Out-of-bounds Read
Details
Trend Micro Security (Consumer) Driver is vulnerable to Out-of-bounds Read.
Multiple products provided by Trend Micro Incorporated contain Out-of-bounds Read vulnerability (CWE-125).
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/vu/JVNVU94105662/ | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15603 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2020-15603 | |
Out-of-bounds Read(CWE-125) | https://cwe.mitre.org/data/definitions/125.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-007306.html", "dc:date": "2024-08-20T17:52+09:00", "dcterms:issued": "2024-08-20T17:52+09:00", "dcterms:modified": "2024-08-20T17:52+09:00", "description": "Trend Micro Security (Consumer) Driver is vulnerable to Out-of-bounds Read.\r\n\r\nMultiple products provided by Trend Micro Incorporated contain Out-of-bounds Read vulnerability (CWE-125).\r\n\r\nTrend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-007306.html", "sec:cpe": [ { "#text": "cpe:/a:trendmicro:antivirus%2B", "@product": "Antivirus+", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:internet_security_2020", "@product": "Internet Security 2020", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:maximum_security_2020", "@product": "Trend Micro Maximum Security 2020", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:premium_security_2020", "@product": "Trend Micro Premium Security 2020", "@vendor": "Trend Micro, Inc.", "@version": "2.2" } ], "sec:cvss": { "@score": "6.0", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2020-007306", "sec:references": [ { "#text": "https://jvn.jp/en/vu/JVNVU94105662/", "@id": "JVNVU#94105662", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15603", "@id": "CVE-2020-15603", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2020-15603", "@id": "CVE-2020-15603", "@source": "NVD" }, { "#text": "https://cwe.mitre.org/data/definitions/125.html", "@id": "CWE-125", "@title": "Out-of-bounds Read(CWE-125)" } ], "title": "Trend Micro Security (Consumer) Driver vulnerable to Out-of-bounds Read" }