cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-32459,https://securityvulnerability.io/vulnerability/CVE-2021-32459,Hard-Coded Password Vulnerability in Trend Micro Home Network Security,"Trend Micro Home Network Security versions 6.6.604 and earlier contain a hard-coded password vulnerability within the log collection server. This security flaw enables attackers, who have already gained the ability to execute high-privileged code on the target device, to exploit this weakness by sending specially crafted network requests. Such exploitation can allow for unauthorized access and arbitrary authentication, posing a significant risk to network security. Users should ensure they are using updated software versions to mitigate this risk.",Trend Micro,Trend Micro Home Network Security,6.5,MEDIUM,0.0006200000061653554,false,,false,false,false,,,false,false,,2021-05-27T10:42:55.000Z,0 CVE-2021-32458,https://securityvulnerability.io/vulnerability/CVE-2021-32458,Stack-based Buffer Overflow Vulnerability in Trend Micro Home Network Security,"The vulnerability affects Trend Micro Home Network Security versions 6.6.604 and earlier, allowing for a stack-based buffer overflow due to improper handling of an iotcl command. By sending a specially crafted iotcl, an attacker with low-privileged code execution abilities on the target device can potentially execute arbitrary code, compromising the security of the device. Organizations utilizing affected versions of Trend Micro Home Network Security should prioritize updating to mitigate potential risks.",Trend Micro,Trend Micro Home Network Security,7.8,HIGH,0.0006300000241026282,false,,false,false,false,,,false,false,,2021-05-27T10:34:17.000Z,0 CVE-2021-32457,https://securityvulnerability.io/vulnerability/CVE-2021-32457,Stack-Based Buffer Overflow Vulnerability in Trend Micro Home Network Security,"Trend Micro Home Network Security versions 6.6.604 and earlier are susceptible to a stack-based buffer overflow vulnerability related to the iotcl interface. This weakness allows an attacker to send a specially crafted iotcl request that could escalate privileges on the affected devices. To successfully exploit this vulnerability, an attacker must first gain the ability to execute low-privileged code on the target device. This exploit can potentially lead to unauthorized access and control over network security settings.",Trend Micro,Trend Micro Home Network Security,7.8,HIGH,0.0004799999878741801,false,,false,false,false,,,false,false,,2021-05-26T13:45:17.000Z,0 CVE-2021-31518,https://securityvulnerability.io/vulnerability/CVE-2021-31518,File Parsing Vulnerability in Trend Micro Home Network Security,"Trend Micro Home Network Security versions 6.5.599 and earlier are susceptible to a file-parsing vulnerability. This flaw could be exploited by attackers to disrupt the normal operation of the device, potentially leading to a denial-of-service condition. This vulnerability mirrors certain aspects of similar vulnerabilities but is distinct in its particulars. For more detailed information, please refer to the official Trend Micro help center.",Trend Micro,Trend Micro Home Network Security,7.5,HIGH,0.0010000000474974513,false,,false,false,false,,,false,false,,2021-05-05T15:05:03.000Z,0 CVE-2021-31517,https://securityvulnerability.io/vulnerability/CVE-2021-31517,File Parsing Vulnerability in Trend Micro Home Network Security,"Trend Micro Home Network Security versions up to 6.5.599 are subject to a file-parsing vulnerability that may allow an attacker to exploit the device. This exploit could lead to a denial-of-service condition, thereby disrupting the availability of the security appliance. Similarities exist between this vulnerability and related issues, but they are fundamentally distinct.",Trend Micro,Trend Micro Home Network Security,7.5,HIGH,0.0010000000474974513,false,,false,false,false,,,false,false,,2021-05-05T15:04:56.000Z,0