cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-27883,https://securityvulnerability.io/vulnerability/CVE-2022-27883,Symlink Vulnerability in Trend Micro Antivirus for Mac,"A symlink vulnerability in Trend Micro Antivirus for Mac version 11.5 enables an attacker with low-level privileges to exploit a specially-crafted file, potentially leading to privilege escalation. This could allow unauthorized actions to be performed on the system. Proper remediation measures should be taken to secure affected systems.",Trend Micro,Trend Micro Antivirus For Mac,7.3,HIGH,0.0004900000058114529,false,,false,false,false,,,false,false,,2022-04-09T00:05:11.000Z,0 CVE-2022-24671,https://securityvulnerability.io/vulnerability/CVE-2022-24671,Local Privilege Escalation Flaw in Trend Micro Antivirus,"A local privilege escalation vulnerability exists in Trend Micro Antivirus for Max, specifically versions 11.0.2150 and earlier. This flaw allows a local attacker, who can execute low-privileged code, to manipulate files during the antivirus update process, potentially leading to elevated privileges. Exploiting this vulnerability requires an attacker to first gain access to the system under a low-privilege context.",Trend Micro,Trend Micro Antivirus For Mac,7.8,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2022-02-24T02:45:48.000Z,0 CVE-2021-43771,https://securityvulnerability.io/vulnerability/CVE-2021-43771,Improper Access Control in Trend Micro Antivirus for Mac 2021,"Trend Micro Antivirus for Mac 2021 v11 is susceptible to an improper access control vulnerability that can result in privilege escalation. This flaw allows an attacker, who has already executed low-privileged code on the system, to gain elevated privileges within the application. Exploitation of this vulnerability could lead to unauthorized access and control of critical features within the software, potentially compromising the security of the system.",Trend Micro,Trend Micro Antivirus For Mac 2021,7.8,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2021-11-30T11:18:43.000Z,0 CVE-2021-28648,https://securityvulnerability.io/vulnerability/CVE-2021-28648,Improper Access Control Flaw in Trend Micro Antivirus for Mac,"Trend Micro Antivirus for Mac versions 2020 and 2021 contain a vulnerability that allows attackers to exploit inadequate access controls to escalate privileges. This flaw requires an attacker to run low-privileged code on the target system, potentially leading to full local privilege escalation within the application. Timely updates and patches are essential to mitigate risks associated with this vulnerability.",Trend Micro,Trend Micro Antivirus For Mac,7.8,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2021-04-22T21:21:21.000Z,0 CVE-2021-25227,https://securityvulnerability.io/vulnerability/CVE-2021-25227,Memory Exhaustion Vulnerability in Trend Micro Antivirus for Mac 2021,"Trend Micro Antivirus for Mac 2021 is susceptible to a memory exhaustion flaw that compromises its scanning capabilities. This vulnerability requires that an attacker gains low-privileged access to the target system. Once exploited, it can disable the critical scanning functionality of the antivirus, leaving the system exposed to further threats.",Trend Micro,Trend Micro Antivirus For Mac,3.3,LOW,0.0016499999910593033,false,,false,false,false,,,false,false,,2021-02-04T19:36:37.000Z,0 CVE-2020-27014,https://securityvulnerability.io/vulnerability/CVE-2020-27014,Race Condition in Trend Micro Antivirus for Mac 2020 Web Threat Protection,"The Web Threat Protection Blocklist component of Trend Micro Antivirus for Mac 2020 is affected by a race condition vulnerability. This flaw can be exploited by attackers who have already gained high-privileged code execution access to the target system. Successfully exploiting this vulnerability may lead to a kernel panic or crash, resulting in service disruption and affecting system stability. It is crucial for users of Trend Micro Antivirus for Mac 2020 to stay informed about this issue and apply any available security updates provided by the vendor.",Trend Micro,Trend Micro Antivirus For Mac (consumer),6.4,MEDIUM,0.0006500000017695129,false,,false,false,false,,,false,false,,2020-10-30T00:15:00.000Z,0 CVE-2020-27015,https://securityvulnerability.io/vulnerability/CVE-2020-27015,Error Message Information Disclosure in Trend Micro Antivirus for Mac 2020,"Trend Micro Antivirus for Mac 2020 is susceptible to an information disclosure vulnerability that can expose sensitive kernel pointers and debug messages to userland. To exploit this issue, an attacker must first gain the ability to execute high-privileged code on the affected system, which could potentially facilitate further attacks or lead to unauthorized access to confidential data. It is crucial for users of this antivirus product to be aware of this vulnerability and take necessary action to secure their systems.",Trend Micro,Trend Micro Antivirus For Mac (consumer),4.4,MEDIUM,0.0006500000017695129,false,,false,false,false,,,false,false,,2020-10-30T00:15:00.000Z,0 CVE-2020-27013,https://securityvulnerability.io/vulnerability/CVE-2020-27013,Web Server API Flaw in Trend Micro Antivirus for Mac 2020,"Trend Micro Antivirus for Mac 2020 features a security weakness stemming from its improper handling of a web server API. This flaw permits an attacker with the ability to execute low-privileged code on a targeted Mac device to read and manipulate sensitive product and user data. By exploiting this vulnerability, an attacker could potentially gain access to critical information, which poses significant risks to user security and privacy.",Trend Micro,Trend Micro Antivirus For Mac (consumer),4.4,MEDIUM,0.0013000000035390258,false,,false,false,false,,,false,false,,2020-10-14T15:10:23.000Z,0 CVE-2020-25778,https://securityvulnerability.io/vulnerability/CVE-2020-25778,Kernel Pointer Leak Vulnerability in Trend Micro Antivirus for Mac 2020,"Trend Micro Antivirus for Mac 2020 contains a vulnerability within a specific kernel extension that can be exploited by an attacker who has gained high-privileged code execution capabilities on the system. By supplying a kernel pointer, an attacker could potentially leak sensitive memory contents, leading to unauthorized information disclosure. This vulnerability underscores the importance of maintaining stringent security practices, including regular updates and monitoring for any signs of abnormal behavior on the system.",Trend Micro,Trend Micro Antivirus For Mac (consumer),6,MEDIUM,0.0006500000017695129,false,,false,false,false,,,false,false,,2020-10-14T15:10:23.000Z,0 CVE-2020-25777,https://securityvulnerability.io/vulnerability/CVE-2020-25777,Bypass Vulnerability in Trend Micro Antivirus for Mac 2020,"Trend Micro Antivirus for Mac 2020 is susceptible to a kernel extension request attack that allows an attacker to bypass the Web Threat Protection feature. This vulnerability requires user interaction, meaning the target must visit a malicious webpage or open an infected file to initiate the attack. Awareness of this vulnerability is crucial for users to mitigate risks associated with potential exploitation.",Trend Micro,Trend Micro Antivirus For Mac (consumer),5.4,MEDIUM,0.001069999998435378,false,,false,false,false,,,false,false,,2020-10-14T15:10:22.000Z,0 CVE-2020-25779,https://securityvulnerability.io/vulnerability/CVE-2020-25779,Homograph Attack Vulnerability in Trend Micro Antivirus for Mac,"Trend Micro Antivirus for Mac 2020 has a vulnerability that can be exploited through an Internationalized Domain Name (IDN) homograph attack. An attacker can manipulate domain names using Puny-code to make malicious websites appear legitimate and thus add them to the approved websites list of Trend Micro Antivirus. This allows the attacker to bypass the web threat protection features of the software, potentially exposing users to security risks when visiting these malicious sites.",Trend Micro,Trend Micro Antivirus For Mac (consumer),3.3,LOW,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-10-13T15:45:15.000Z,0 CVE-2020-25776,https://securityvulnerability.io/vulnerability/CVE-2020-25776,Privilege Escalation Vulnerability in Trend Micro Antivirus for Mac 2020,"Trend Micro Antivirus for Mac 2020 is susceptible to a symbolic link privilege escalation attack. This vulnerability allows an attacker with low-privileged code execution capabilities to exploit a critical system file, ultimately escalating their privileges. Successful exploitation could enable unauthorized access and manipulation of system functions, posing significant risks to system integrity and user data.",Trend Micro,Trend Micro Antivirus For Mac (consumer),7.8,HIGH,0.0006500000017695129,false,,false,false,false,,,false,false,,2020-10-02T22:00:17.000Z,0 CVE-2019-19695,https://securityvulnerability.io/vulnerability/CVE-2019-19695,Privilege Escalation Vulnerability in Trend Micro Antivirus for Mac,"A privilege escalation vulnerability exists in Trend Micro Antivirus for Mac versions 2019 v9.0.1379 and earlier, allowing attackers to exploit the software's handling of symbolic links. This exploitation could enable unauthorized modification of target files, leading to potential system compromises and unauthorized access to sensitive information.",Trend Micro,Trend Micro Antivirus For Mac,7.5,HIGH,0.0008399999933317304,false,,false,false,false,,,false,false,,2019-12-24T08:25:11.000Z,0 CVE-2018-15366,https://securityvulnerability.io/vulnerability/CVE-2018-15366,,A UrlfWTPPagePtr KERedirect Use-After-Free Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.,Trend Micro,Trend Micro Antivirus For Mac (consumer),7.8,HIGH,0.0006500000017695129,false,,false,false,false,,,false,false,,2018-10-23T14:00:00.000Z,0 CVE-2018-18327,https://securityvulnerability.io/vulnerability/CVE-2018-18327,,A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6eDC offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.,Trend Micro,Trend Micro Antivirus For Mac (consumer),7.8,HIGH,0.0006500000017695129,false,,false,false,false,,,false,false,,2018-10-23T14:00:00.000Z,0 CVE-2018-15367,https://securityvulnerability.io/vulnerability/CVE-2018-15367,,A ctl_set KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.,Trend Micro,Trend Micro Antivirus For Mac (consumer),7.8,HIGH,0.0006500000017695129,false,,false,false,false,,,false,false,,2018-10-23T14:00:00.000Z,0 CVE-2018-18329,https://securityvulnerability.io/vulnerability/CVE-2018-18329,,A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6F4E offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.,Trend Micro,Trend Micro Antivirus For Mac (consumer),7.8,HIGH,0.0006500000017695129,false,,false,false,false,,,false,false,,2018-10-23T14:00:00.000Z,0 CVE-2018-18328,https://securityvulnerability.io/vulnerability/CVE-2018-18328,,A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6F6A offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.,Trend Micro,Trend Micro Antivirus For Mac (consumer),7.8,HIGH,0.0006500000017695129,false,,false,false,false,,,false,false,,2018-10-23T14:00:00.000Z,0