cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-38764,https://securityvulnerability.io/vulnerability/CVE-2022-38764,Local Privilege Escalation in Trend Micro HouseCall,"A vulnerability in Trend Micro HouseCall versions up to 1.62.1.1133 allows local attackers to escalate privileges. This is due to an overly permissive folder in the product installer, which can be exploited to gain unauthorized access and control over the system. Implementing proper permission settings is crucial to mitigate this risk.",Trend Micro,Trend Micro Housecall (consumer),7.8,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2022-09-19T18:01:00.000Z,0 CVE-2020-8607,https://securityvulnerability.io/vulnerability/CVE-2020-8607,Input Validation Vulnerability in Trend Micro Rootkit Protection Driver,"An input validation issue present in various Trend Micro products utilizing a specific version of the rootkit protection driver can potentially be exploited by an attacker with administrative privileges. This flaw allows unauthorized modification of kernel addresses, which may lead to system instability, crashes, or even execution of arbitrary code at the kernel level. The attacker must have already gained administrator access to the affected machine prior to exploitation, emphasizing the need for robust security measures to prevent initial unauthorized access.",Trend Micro,"Trend Micro Apex One,Trend Micro Officescan,Trend Micro Deep Security,Trend Micro Worry-free Business Security,Trend Micro Security (consumer Family),Trend Micro Safe Lock,Trend Micro Serverprotect,Trend Micro Portable Security,Trend Micro Housecall,Trend Micro Anti-threat Toolkit (attk),Trend Micro Rootkit Buster",6.7,MEDIUM,0.0005200000014156103,false,,false,false,false,,,false,false,,2020-08-05T14:05:23.000Z,0