Show filters
137 Total Results
Displaying 31-40 of 137
Sort by:
Attacker Value
Unknown
CVE-2023-34144
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
An untrusted search path vulnerability in the Trend Micro Apex One and Apex One as a Service security agent could allow a local attacker to escalate their privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is a similar, but not identical vulnerability as CVE-2023-34145.
0
Attacker Value
Unknown
CVE-2023-32557
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
A path traversal vulnerability in the Trend Micro Apex One and Apex One as a Service could allow an unauthenticated attacker to upload an arbitrary file to the Management Server which could lead to remote code execution with system privileges.
0
Attacker Value
Unknown
CVE-2023-32556
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
A link following vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to disclose sensitive information.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2023-32555
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations.
Please note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32554.
0
Attacker Value
Unknown
CVE-2023-32554
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations.
Please note: a local attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32555.
0
Attacker Value
Unknown
CVE-2023-32553
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
An Improper access control vulnerability in Trend Micro Apex One and Apex One as a Service could allow an unauthenticated user under certain circumstances to disclose sensitive information on agents.
This is similar to, but not identical to CVE-2023-32552.
0
Attacker Value
Unknown
CVE-2023-32552
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
An Improper access control vulnerability in Trend Micro Apex One and Apex One as a Service could allow an unauthenticated user under certain circumstances to disclose sensitive information on agents.
This is similar to, but not identical to CVE-2023-32553
0
Attacker Value
Unknown
CVE-2023-30902
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
A privilege escalation vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to unintentionally delete privileged Trend Micro registry keys including its own protected registry keys on affected installations.
0
Attacker Value
Unknown
CVE-2023-25148
Disclosure Date: March 10, 2023 (last updated November 08, 2023)
A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to exploit the vulnerability by changing a specific file into a pseudo-symlink, allowing privilege escalation on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
0
Attacker Value
Unknown
CVE-2023-25147
Disclosure Date: March 10, 2023 (last updated November 08, 2023)
An issue in the Trend Micro Apex One agent could allow an attacker who has previously acquired administrative rights via other means to bypass the protection by using a specifically crafted DLL during a specific update process.
Please note: an attacker must first obtain administrative access on the target system via another method in order to exploit this.
0