Page 2 of 7 results (0.006 seconds)

CVSS: 3.3EPSS: 0%CPEs: 1EXPL: 0

Trend Micro Antivirus for Mac 2020 (Consumer) has a vulnerability in which a Internationalized Domain Name homograph attack (Puny-code) could be used to add a malicious website to the approved websites list of Trend Micro Antivirus for Mac to bypass the web threat protection feature. Trend Micro Antivirus para Mac versión 2020 (Consumer), presenta una vulnerabilidad en la que un ataque de homógrafo Internationalized Domain Name (código Puny) podría ser usado para agregar un sitio web malicioso a la lista de sitios web aprobados de Trend Micro Antivirus para Mac para omitir la funcionalidad web threat protection • https://helpcenter.trendmicro.com/en-us/article/TMKA-09949 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Trend Micro Antivirus for Mac 2020 (Consumer) is vulnerable to a symbolic link privilege escalation attack where an attacker could exploit a critical file on the system to escalate their privileges. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Trend Micro Antivirus para Mac 2020 (Consumer) es vulnerable a un ataque de escalada de privilegios de enlace simbólico donde un atacante podría explotar un archivo crítico en el sistema para escalar sus privilegios. Un atacante debe primero obtener la capacidad de ejecutar código poco privilegiado en el sistema objetivo para explotar esta vulnerabilidad This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Antivirus for Mac. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the iTISPlugin module. • https://helpcenter.trendmicro.com/en-us/article/TMKA-09924 https://www.zerodayinitiative.com/advisories/ZDI-20-1236 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •