Added |
CPE Configuration |
|
AND
OR
*cpe:2.3:a:trendmicro:antivirus_\+_security_2020:*:*:*:*:*:*:*:* versions up to (including) 16.0.1221
*cpe:2.3:a:trendmicro:internet_security_2020:*:*:*:*:*:*:*:* versions up to (including) 16.0.1221
*cpe:2.3:a:trendmicro:maximum_security_2020:*:*:*:*:*:*:*:* versions up to (including) 16.0.1221
*cpe:2.3:a:trendmicro:premium_security_2020:*:*:*:*:*:*:*:* versions up to (including) 16.0.1221
OR
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
|
Added |
CVSS V2 |
|
NIST (AV:L/AC:M/Au:N/C:C/I:C/A:C)
|
Added |
CVSS V2 Metadata |
|
Victim must voluntarily interact with attack mechanism
|
Added |
CVSS V3.1 |
|
NIST AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
Added |
CWE |
|
NIST CWE-426
|
Changed |
Reference Type |
https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124011.aspx No Types Assigned
|
https://esupport.trendmicro.com/en-us/home/pages/technical-support/1124011.aspx Vendor Advisory
|
Changed |
Reference Type |
https://safebreach.com/Post/Trend-Micro-Security-16-DLL-Search-Order-Hijacking-and-Potential-Abuses-CVE-2019-15628 No Types Assigned
|
https://safebreach.com/Post/Trend-Micro-Security-16-DLL-Search-Order-Hijacking-and-Potential-Abuses-CVE-2019-15628 Third Party Advisory
|