cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-15605,https://securityvulnerability.io/vulnerability/CVE-2020-15605,LDAP Authentication Bypass Vulnerability in Trend Micro Vulnerability Protection,"An LDAP authentication bypass vulnerability exists in Trend Micro Vulnerability Protection 2.0 SP2 that could enable an unauthenticated attacker to circumvent manager authentication. This exploit is facilitated by prior knowledge of the targeted organization's structure. To mitigate this risk, enabling multi-factor authentication is highly recommended. Installations that utilize manager native authentication or SAML authentication remain unaffected by this issue.",Trend Micro,Trend Micro Vulnerability Protection,8.1,HIGH,0.005189999938011169,false,,false,false,false,,,false,false,,2020-08-27T20:35:19.000Z,0 CVE-2020-8601,https://securityvulnerability.io/vulnerability/CVE-2020-8601,DLL Load Vulnerability in Trend Micro Vulnerability Protection Product,"Trend Micro Vulnerability Protection 2.0 is susceptible to a vulnerability that allows attackers to load malicious DLL files from the product installer’s directory. This can lead to unauthorized execution of code and compromise system integrity, highlighting the importance of keeping the software updated and securing all installation directories against potential exploitation.",Trend Micro,Trend Micro Vulnerability Protection,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-02-20T22:50:23.000Z,0 CVE-2019-9488,https://securityvulnerability.io/vulnerability/CVE-2019-9488,XML External Entity Attack Vulnerability in Trend Micro Deep Security Manager,"Trend Micro Deep Security Manager is susceptible to an XML External Entity Attack, which could lead to unauthorized data exposure if exploited. Attackers need root or admin access to a protected host recognized by the Deep Security Manager to execute the attack. Mitigation strategies are essential to protect against potential exploitation.",Trend Micro,"Trend Micro Deep Security,Trend Micro Vulnerability Protection",4.9,MEDIUM,0.0006500000017695129,false,,false,false,false,,,false,false,,2019-09-11T18:00:08.000Z,0