
CVE-2022-38764 – Trend Micro HouseCall Incorrect Permission Assignment Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2022-38764
31 Aug 2022 — A vulnerability on Trend Micro HouseCall version 1.62.1.1133 and below could allow a local attacker to escalate privlieges due to an overly permissive folder om the product installer. Una vulnerabilidad en Trend Micro HouseCall versiones 1.62.1.1133 y anteriores, podría permitir a un atacante local escalar los privilegios debido a una carpeta demasiado permisiva en el instalador del producto This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro HouseCall. ... • https://helpcenter.trendmicro.com/en-us/article/tmka-11092 • CWE-276: Incorrect Default Permissions •

CVE-2021-32466 – Trend Micro HouseCall for Home Networks Uncontrolled Search Path Element Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2021-32466
24 Sep 2021 — An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. Una vulnerabilidad de escalada de privilegios de elementos de búsqueda no controlada en Trend Mi... • https://helpcenter.trendmicro.com/en-us/article/tmka-10626 • CWE-427: Uncontrolled Search Path Element •

CVE-2021-31519 – Trend Micro HouseCall for Home Networks Incorrect Permission Assignment Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2021-31519
23 Apr 2021 — An incorrect permission vulnerability in the product installer folders for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a scan. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. Una vulnerabilidad de permiso incorrecto en las carpetas de... • https://helpcenter.trendmicro.com/en-us/article/TMKA-10310 • CWE-276: Incorrect Default Permissions •

CVE-2021-28649 – Trend Micro HouseCall for Home Networks Incorrect Permission Assignment Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2021-28649
23 Apr 2021 — An incorrect permission vulnerability in the product installer for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a scan. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability. Una vulnerabilidad de permiso incorrecto en el instalador del produ... • https://helpcenter.trendmicro.com/en-us/article/TMKA-10310 • CWE-276: Incorrect Default Permissions •

CVE-2021-25247
https://notcve.org/view.php?id=CVE-2021-25247
27 Jan 2021 — A DLL hijacking vulnerability Trend Micro HouseCall for Home Networks version 5.3.1063 and below could allow an attacker to use a malicious DLL to escalate privileges and perform arbitrary code execution. An attacker must already have user privileges on the machine to exploit this vulnerability. Una vulnerabilidad de secuestro de DLL de Trend Micro HouseCall for Home Networks versiones 5.3.1063 y anteriores, podría permitir a un atacante utilizar una DLL maliciosa para escalar privilegios y llevar a cabo un... • https://helpcenter.trendmicro.com/en-us/article/TMKA-10180 • CWE-427: Uncontrolled Search Path Element •

CVE-2019-19689
https://notcve.org/view.php?id=CVE-2019-19689
18 Dec 2019 — Trend Micro HouseCall for Home Networks (versions below 5.3.0.1063) could be exploited via a DLL Hijack related to a vulnerability on the packer that the program uses. Trend Micro HouseCall for Home Networks (versiones por debajo de 5.3.0.1063), podría ser explotado mediante un secuestro de DLL relacionado con una vulnerabilidad en el empaquetador que el programa utiliza. • https://helpcenter.trendmicro.com/en-us/article/TMKA-21674 • CWE-427: Uncontrolled Search Path Element •

CVE-2019-19688
https://notcve.org/view.php?id=CVE-2019-19688
18 Dec 2019 — A privilege escalation vulnerability in Trend Micro HouseCall for Home Networks (versions below 5.3.0.1063) could be exploited allowing an attacker to place a malicious DLL file into the application directory and elevate privileges. Una vulnerabilidad de escalada de privilegios en Trend Micro HouseCall for Home Networks (versiones por debajo de 5.3.0.1063), podría ser explotada permitiendo a un atacante colocar un archivo DLL malicioso en el directorio de la aplicación y elevar los privilegios. • https://helpcenter.trendmicro.com/en-us/article/TMKA-21674 •

CVE-2012-1425
https://notcve.org/view.php?id=CVE-2012-1425
21 Mar 2012 — The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, AVEngine 20101.3.0.103 in Symantec Endpoint Prote... • http://osvdb.org/80389 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2012-1443
https://notcve.org/view.php?id=CVE-2012-1443
21 Mar 2012 — The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat QuickHeal) 11.00, G Data AntiVirus 21, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Command Antivirus 5.2.11.5, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Emsisoft Anti-Malware 5.1.0.1, PC Tools AntiVirus 7.0.3.5, F-Prot Antivirus 4.6.2.117, VirusBuster 13.6.151.0, Fortinet Antivirus 4.2.254.0, Antiy Labs AVL SDK 2.0.3.7, K7 AntiVirus 9.77.3565, Trend Micro HouseCall 9.120.0.1004, Kaspersky An... • http://osvdb.org/80454 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2012-1448
https://notcve.org/view.php?id=CVE-2012-1448
21 Mar 2012 — The CAB file parser in Quick Heal (aka Cat QuickHeal) 11.00, Trend Micro AntiVirus 9.120.0.1004, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Trend Micro HouseCall 9.120.0.1004, and Emsisoft Anti-Malware 5.1.0.1 allows remote attackers to bypass malware detection via a CAB file with a modified cbCabinet field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CAB parser implementations. El analizador... • http://www.ieee-security.org/TC/SP2012/program.html • CWE-264: Permissions, Privileges, and Access Controls •