Metrics
Affected Vendors & Products
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Fri, 11 Jul 2025 04:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Thu, 10 Jul 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 10 Jul 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Trend Micro Password Manager (Consumer) version 5.8.0.1327 and below is vulnerable to a Link Following Privilege Escalation Vulnerability that could allow an attacker the opportunity to abuse symbolic links and other methods to delete any file/folder and achieve privilege escalation. | |
First Time appeared |
Trendmicro
Trendmicro password Manager |
|
Weaknesses | CWE-64 | |
CPEs | cpe:2.3:a:trendmicro:password_manager:5.8.0.1330:*:*:*:*:*:*:* | |
Vendors & Products |
Trendmicro
Trendmicro password Manager |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2025-07-11T03:55:32.006Z
Reserved: 2025-06-19T15:06:34.443Z
Link: CVE-2025-52837

Updated: 2025-07-10T19:07:43.416Z

Status : Awaiting Analysis
Published: 2025-07-10T19:15:25.870
Modified: 2025-07-15T13:14:49.980
Link: CVE-2025-52837

No data.