PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 450

of 23

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Trendmicro
Urgent
Remediate Within one Week
CVSS v2N/ACVSS v37.2

A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation. Note that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

A remote attacker could leverage a vulnerability in Trend Micro Mobile Security (Enterprise) 9.8 SP5 to download a particular log file which may contain sensitive information regarding the product.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34146 and CVE-2023-34147.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34146 and CVE-2023-34148.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

An exposed dangerous function vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate privileges and write an arbitrary value to specific Trend Micro agent subkeys on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34147 and CVE-2023-34148.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34144.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is a similar, but not identical vulnerability as CVE-2023-34145.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32604.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32605.

Published:   Updated:

Vulnerability Type: Path traversal

Vendor(s):  Trendmicro
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

A path traversal vulnerability in the Trend Micro Apex One and Apex One as a Service could allow an unauthenticated attacker to upload an arbitrary file to the Management Server which could lead to remote code execution with system privileges.

Published:   Updated:

Vulnerability Type: Spoofing

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.5

A link following vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to disclose sensitive information. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32554.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37

A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32555.

Published:   Updated:

Vulnerability Type: Improper access control

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.3

An Improper access control vulnerability in Trend Micro Apex One and Apex One as a Service could allow an unauthenticated user under certain circumstances to disclose sensitive information on agents. This is similar to, but not identical to CVE-2023-32552.

Published:   Updated:

Vulnerability Type: Improper access control

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.3

An Improper access control vulnerability in Trend Micro Apex One and Apex One as a Service could allow an unauthenticated user under certain circumstances to disclose sensitive information on agents. This is similar to, but not identical to CVE-2023-32553

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32536.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

Affected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32537.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers. This is similar to, but not identical to CVE-2023-32531 through 32534.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers. This is similar to, but not identical to CVE-2023-32531 through 32535.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Trendmicro
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers. This is similar to, but not identical to CVE-2023-32531 through 32535.

of 23