
CVE-2019-19693 – Trend Micro Maximum Security Link Resolution Information Disclosure And Denial-of-Service Vulnerability
https://notcve.org/view.php?id=CVE-2019-19693
19 Dec 2019 — The Trend Micro Security 2020 consumer family of products contains a vulnerability that could allow a local attacker to disclose sensitive information or to create a denial-of-service condition on affected installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. La familia de productos de consumo Trend Micro Security 2020, contiene una vulnerabilidad que podría permitir a un atacante local revelar información confide... • https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124043.aspx • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2019-18190
https://notcve.org/view.php?id=CVE-2019-18190
09 Dec 2019 — Trend Micro Security (Consumer) 2020 (v16.x) is affected by a vulnerability in where null pointer dereference errors result in the crash of application, which could potentially lead to possible unsigned code execution under certain circumstances. Trend Micro Security (Consumer) 2020 (versión v16.x), está afectado por una vulnerabilidad en donde los errores de desreferencia del puntero null resultan en el bloqueo de la aplicación, lo que podría conllevar a la potencial ejecución de código sin firmar bajo det... • https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124031.aspx • CWE-476: NULL Pointer Dereference •

CVE-2019-15628
https://notcve.org/view.php?id=CVE-2019-15628
02 Dec 2019 — Trend Micro Security (Consumer) 2020 (v16.0.1221 and below) is affected by a DLL hijacking vulnerability that could allow an attacker to use a specific service as an execution and/or persistence mechanism which could execute a malicious program each time the service is started. Trend Micro Security (Consumer) 2020 (versiones v16.0.1221 y posteriores), está afectado por una vulnerabilidad de secuestro de DLL que podría permitir a un atacante usar un servicio específico como un mecanismo de ejecución y/o pers... • https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124011.aspx • CWE-426: Untrusted Search Path •

CVE-2019-14686
https://notcve.org/view.php?id=CVE-2019-14686
21 Aug 2019 — A DLL hijacking vulnerability exists in the Trend Micro Security's 2019 consumer family of products (v15) Folder Shield component and the standalone Trend Micro Ransom Buster (1.0) tool in which, if exploited, would allow an attacker to load a malicious DLL, leading to elevated privileges. Existe una vulnerabilidad de secuestro de DLL en el componente Folder Shield de la familia de productos de consumo de Trend Micro Security 2019 (v15) y la herramienta independiente Trend Micro Ransom Buster (1.0) en la qu... • https://esupport.trendmicro.com/en-us/home/pages/technical-support/1123421.aspx • CWE-427: Uncontrolled Search Path Element •

CVE-2019-14685 – Trend Maximum Security 2019 Unquoted Search Path
https://notcve.org/view.php?id=CVE-2019-14685
21 Aug 2019 — A local privilege escalation vulnerability exists in Trend Micro Security 2019 (v15.0) in which, if exploited, would allow an attacker to manipulate a specific product feature to load a malicious service. Existe una vulnerabilidad de escalada de privilegios locales en Trend Micro Security 2019 (v15.0) en la que, si se explota, permitiría a un atacante manipular una característica específica del producto para cargar un servicio malicioso. Trend Maximum Security 2019 suffers from an unquoted search path vulne... • http://packetstormsecurity.com/files/154200/Trend-Maximum-Security-2019-Unquoted-Search-Path.html • CWE-428: Unquoted Search Path or Element •

CVE-2018-18333
https://notcve.org/view.php?id=CVE-2018-18333
05 Feb 2019 — A DLL hijacking vulnerability in Trend Micro Security 2019 (Consumer) versions below 15.0.0.1163 and below could allow an attacker to manipulate a specific DLL and escalate privileges on vulnerable installations. Una vulnerabilidad de secuestro de DLL en Trend Micro Security 2019 (Consumer), en versiones anteriores a la 15.0.0.1163, podría permitir a un atacante manipular un DLL específico y escalar privilegios en instalaciones vulnerables. • https://github.com/mrx04programmer/Dr.DLL-CVE-2018-18333 • CWE-426: Untrusted Search Path •

CVE-2018-18328 – Trend Micro Anti-Virus KERedirect Untrusted Pointer Dereference Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2018-18328
19 Oct 2018 — A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6F6A offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de desreferencia de puntero no fia... • http://www.securityfocus.com/bid/105757 • CWE-476: NULL Pointer Dereference •

CVE-2018-15366 – Trend Micro Anti-Virus UrlfWTPPagePtr KERedirect Use-After-Free Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2018-15366
19 Oct 2018 — A UrlfWTPPagePtr KERedirect Use-After-Free Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de escalado de privilegios y uso de memoria previamente liberada UrlfWTPPagePtr KERedirect en Trend Micro Antivirus for Mac (Consumer) ... • http://www.securityfocus.com/bid/105757 • CWE-416: Use After Free •

CVE-2018-18327 – Trend Micro Anti-Virus KERedirect Untrusted Pointer Dereference Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2018-18327
19 Oct 2018 — A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6eDC offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de desreferencia de puntero no fia... • http://www.securityfocus.com/bid/105757 • CWE-476: NULL Pointer Dereference •

CVE-2018-15367 – Trend Micro Anti-Virus ctl_set KERedirect Untrusted Pointer Dereference Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2018-15367
19 Oct 2018 — A ctl_set KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de desreferencia de puntero no fiable y escalado de privilegios en ctl_set KERedirect en Trend Micro Antivirus for Mac (Consume... • http://www.securityfocus.com/bid/105757 • CWE-476: NULL Pointer Dereference •