Show filters
493 Total Results
Displaying 11-20 of 493
Sort by:
Attacker Value
Unknown

CVE-2022-40139

Disclosure Date: September 19, 2022 (last updated February 13, 2025)
Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2024-46903

Disclosure Date: October 22, 2024 (last updated October 26, 2024)
A vulnerability in Trend Micro Deep Discovery Inspector (DDI) versions 5.8 and above could allow an attacker to disclose sensitive information affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2024-46902

Disclosure Date: October 22, 2024 (last updated October 26, 2024)
A vulnerability in Trend Micro Deep Discovery Inspector (DDI) versions 5.8 and above could allow an attacker to disclose sensitive information affected installations. Please note: an attacker must first obtain the ability to execute high-privileged code (admin user rights) on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2024-45335

Disclosure Date: October 22, 2024 (last updated October 26, 2024)
Trend Micro Antivirus One, version 3.10.4 and below contains a vulnerability that could allow an attacker to use a specifically crafted virus to allow itself to bypass and evade a virus scan detection.
Attacker Value
Unknown

CVE-2024-45334

Disclosure Date: October 22, 2024 (last updated October 26, 2024)
Trend Micro Antivirus One versions 3.10.4 and below (Consumer) is vulnerable to an Arbitrary Configuration Update that could allow unauthorized access to product configurations and functions.
Attacker Value
Unknown

CVE-2024-36359

Disclosure Date: June 10, 2024 (last updated October 04, 2024)
A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 could allow an attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2024-36306

Disclosure Date: June 10, 2024 (last updated October 05, 2024)
A link following vulnerability in the Trend Micro Apex One and Apex One as a Service Damage Cleanup Engine could allow a local attacker to create a denial-of-service condition on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2024-36305

Disclosure Date: June 10, 2024 (last updated October 05, 2024)
A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2024-36303

Disclosure Date: June 10, 2024 (last updated October 05, 2024)
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2024-36302.
Attacker Value
Unknown

CVE-2024-23940

Disclosure Date: January 29, 2024 (last updated February 07, 2024)
Trend Micro uiAirSupport, included in the Trend Micro Security 2023 family of consumer products, version 6.0.2092 and below is vulnerable to a DLL hijacking/proxying vulnerability, which if exploited could allow an attacker to impersonate and modify a library to execute code on the system and ultimately escalate privileges on an affected system.