cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2020-15605,https://securityvulnerability.io/vulnerability/CVE-2020-15605,,"If LDAP authentication is enabled, an LDAP authentication bypass vulnerability in Trend Micro Vulnerability Protection 2.0 SP2 could allow an unauthenticated attacker with prior knowledge of the targeted organization to bypass manager authentication. Enabling multi-factor authentication prevents this attack. Installations using manager native authentication or SAML authentication are not impacted by this vulnerability.",Trend Micro,Trend Micro Vulnerability Protection,8.1,HIGH,0.005189999938011169,false,false,false,false,,false,false,2020-08-27T20:35:19.000Z,0 CVE-2020-8601,https://securityvulnerability.io/vulnerability/CVE-2020-8601,,Trend Micro Vulnerability Protection 2.0 is affected by a vulnerability that could allow an attack to use the product installer to load other DLL files located in the same directory.,Trend Micro,Trend Micro Vulnerability Protection,7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2020-02-20T22:50:23.000Z,0 CVE-2019-9488,https://securityvulnerability.io/vulnerability/CVE-2019-9488,,"Trend Micro Deep Security Manager (10.x, 11.x) and Vulnerability Protection (2.0) are vulnerable to a XML External Entity Attack. However, for the attack to be possible, the attacker must have root/admin access to a protected host which is authorized to communicate with the Deep Security Manager (DSM).",Trend Micro,"Trend Micro Deep Security,Trend Micro Vulnerability Protection",4.9,MEDIUM,0.0006500000017695129,false,false,false,false,,false,false,2019-09-11T18:00:08.000Z,0