cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-38764,https://securityvulnerability.io/vulnerability/CVE-2022-38764,,A vulnerability on Trend Micro HouseCall version 1.62.1.1133 and below could allow a local attacker to escalate privlieges due to an overly permissive folder om the product installer.,Trend Micro,Trend Micro Housecall (consumer),7.8,HIGH,0.00044999999227002263,false,false,false,false,,false,false,2022-09-19T18:01:00.000Z,0 CVE-2021-32466,https://securityvulnerability.io/vulnerability/CVE-2021-32466,,An uncontrolled search path element privilege escalation vulnerability in Trend Micro HouseCall for Home Networks version 5.3.1225 and below could allow an attacker to escalate privileges by placing a custom crafted file in a specific directory to load a malicious library. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.,Trend Micro,Trend Micro Housecall For Home Networks,7,HIGH,0.00044999999227002263,false,false,false,false,,false,false,2021-09-29T10:21:29.000Z,0 CVE-2021-31519,https://securityvulnerability.io/vulnerability/CVE-2021-31519,,An incorrect permission vulnerability in the product installer folders for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a scan. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.,Trend Micro,Trend Micro Housecall For Home Networks,7.3,HIGH,0.0004900000058114529,false,false,false,false,,false,false,2021-05-12T14:57:42.000Z,0 CVE-2021-28649,https://securityvulnerability.io/vulnerability/CVE-2021-28649,,An incorrect permission vulnerability in the product installer for Trend Micro HouseCall for Home Networks version 5.3.1179 and below could allow an attacker to escalate privileges by placing arbitrary code on a specified folder and have that code be executed by an Administrator who is running a scan. Please note that an attacker must first obtain the ability to execute low-privileged code on the target system to exploit this vulnerability.,Trend Micro,Trend Micro Housecall For Home Networks,7.3,HIGH,0.0004900000058114529,false,false,false,false,,false,false,2021-05-12T14:57:41.000Z,0 CVE-2021-25247,https://securityvulnerability.io/vulnerability/CVE-2021-25247,,A DLL hijacking vulnerability Trend Micro HouseCall for Home Networks version 5.3.1063 and below could allow an attacker to use a malicious DLL to escalate privileges and perform arbitrary code execution. An attacker must already have user privileges on the machine to exploit this vulnerability.,Trend Micro,Trend Micro Housecall For Home Networks,7.8,HIGH,0.0007200000109151006,false,false,false,false,,false,false,2021-01-27T19:10:26.000Z,0 CVE-2020-8607,https://securityvulnerability.io/vulnerability/CVE-2020-8607,,An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.,Trend Micro,"Trend Micro Apex One,Trend Micro Officescan,Trend Micro Deep Security,Trend Micro Worry-free Business Security,Trend Micro Security (consumer Family),Trend Micro Safe Lock,Trend Micro Serverprotect,Trend Micro Portable Security,Trend Micro Housecall,Trend Micro Anti-threat Toolkit (attk),Trend Micro Rootkit Buster",6.7,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2020-08-05T14:05:23.000Z,0 CVE-2019-19689,https://securityvulnerability.io/vulnerability/CVE-2019-19689,,Trend Micro HouseCall for Home Networks (versions below 5.3.0.1063) could be exploited via a DLL Hijack related to a vulnerability on the packer that the program uses.,Trend Micro,Trend Micro Housecall For Home Networks,7.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2019-12-18T18:30:16.000Z,0 CVE-2019-19688,https://securityvulnerability.io/vulnerability/CVE-2019-19688,,A privilege escalation vulnerability in Trend Micro HouseCall for Home Networks (versions below 5.3.0.1063) could be exploited allowing an attacker to place a malicious DLL file into the application directory and elevate privileges.,Trend Micro,Trend Micro Housecall For Home Networks,7.8,HIGH,0.0006300000241026282,false,false,false,false,,false,false,2019-12-18T18:30:15.000Z,0 CVE-2008-2435,https://securityvulnerability.io/vulnerability/CVE-2008-2435,,Use-after-free vulnerability in the Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote attackers to execute arbitrary code via a crafted notifyOnLoadNative callback function.,Trend Micro,Housecall,,,0.27768000960350037,false,false,false,false,,false,false,2008-12-23T18:13:00.000Z,0 CVE-2008-2434,https://securityvulnerability.io/vulnerability/CVE-2008-2434,,"The Trend Micro HouseCall ActiveX control 6.51.0.1028 and 6.6.0.1278 in Housecall_ActiveX.dll allows remote attackers to download an arbitrary library file onto a client system via a ""custom update server"" argument. NOTE: this can be leveraged for code execution by writing to a Startup folder.",Trend Micro,Housecall,,,0.27768000960350037,false,false,false,false,,false,false,2008-12-23T18:13:00.000Z,0 CVE-2003-0646,https://securityvulnerability.io/vulnerability/CVE-2003-0646,,"Multiple buffer overflows in ActiveX controls used by Trend Micro HouseCall 5.5 and 5.7, and Damage Cleanup Server 1.0, allow remote attackers to execute arbitrary code via long parameter strings.",Trend Micro,"Housecall,Damage Cleanup Server",,,0.024229999631643295,false,false,false,false,,false,false,2003-08-27T04:00:00.000Z,0