4 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

24 Sep 2020 — An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CWE-295: Improper server certificate verification in the communication with the update server. Una vulnerabilidad de comprobación de certificación de servidor SSL incompleta en la familia de productos de consumidor... • https://helpcenter.trendmicro.com/en-us/article/TMKA-09890 • CWE-295: Improper Certificate Validation •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

24 Sep 2020 — An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CWE-494: Update files are not properly verified. Una vulnerabilidad de comprobación de certificación de servidor SSL incompleta en la familia de productos de consumo Trend Micro Security 2019 versión (v15), podría ... • https://helpcenter.trendmicro.com/en-us/article/TMKA-09890 • CWE-295: Improper Certificate Validation CWE-494: Download of Code Without Integrity Check •

CVSS: 7.2EPSS: 0%CPEs: 25EXPL: 0

05 Aug 2020 — An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.... • https://jvn.jp/en/vu/JVNVU99160193/index.html • CWE-20: Improper Input Validation •

CVSS: 4.7EPSS: 0%CPEs: 6EXPL: 0

20 Feb 2020 — The Trend Micro Security 2019 (15.0.0.1163 and below) consumer family of products is vulnerable to a denial of service (DoS) attack in which a malicious actor could manipulate a key file at a certain time during the system startup process to disable the product's malware protection functions or the entire product completely.. La familia de productos del consumidor de Trend Micro Security 2019 (versiones 15.0.0.1163 y posteriores), es vulnerable a un ataque de denegación de servicio (DoS) en el que un actor ... • https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124056.aspx •