Show filters
137 Total Results
Displaying 41-50 of 137
Sort by:
Attacker Value
Unknown

CVE-2023-25146

Disclosure Date: March 10, 2023 (last updated November 08, 2023)
A security agent link following vulnerability in the Trend Micro Apex One agent could allow a local attacker to quarantine a file, delete the original folder and replace with a junction to an arbitrary location, ultimately leading to an arbitrary file dropped to an arbitrary location. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2023-25145

Disclosure Date: March 10, 2023 (last updated November 08, 2023)
A link following vulnerability in the scanning function of Trend Micro Apex One agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2023-25144

Disclosure Date: March 10, 2023 (last updated October 08, 2023)
An improper access control vulnerability in the Trend Micro Apex One agent could allow a local attacker to gain elevated privileges and create arbitrary directories with arbitrary ownership.
Attacker Value
Unknown

CVE-2023-25143

Disclosure Date: March 10, 2023 (last updated October 08, 2023)
An uncontrolled search path element vulnerability in the Trend Micro Apex One Server installer could allow an attacker to achieve a remote code execution state on affected products.
Attacker Value
Unknown

CVE-2022-45798

Disclosure Date: December 24, 2022 (last updated November 08, 2023)
A link following vulnerability in the Damage Cleanup Engine component of Trend Micro Apex One and Trend Micro Apex One as a Service could allow a local attacker to escalate privileges by creating a symbolic link and abusing the service to delete a file. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2022-44654

Disclosure Date: December 12, 2022 (last updated October 08, 2023)
Affected builds of Trend Micro Apex One and Apex One as a Service contain a monitor engine component that is complied without the /SAFESEH memory protection mechanism which helps to monitor for malicious payloads. The affected component's memory protection mechanism has been updated to enhance product security.
Attacker Value
Unknown

CVE-2022-44653

Disclosure Date: December 12, 2022 (last updated November 08, 2023)
A security agent directory traversal vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2022-44652

Disclosure Date: December 12, 2022 (last updated November 08, 2023)
An improper handling of exceptional conditions vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2022-44651

Disclosure Date: December 12, 2022 (last updated November 08, 2023)
A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Attacker Value
Unknown

CVE-2022-44650

Disclosure Date: December 12, 2022 (last updated November 08, 2023)
A memory corruption vulnerability in the Unauthorized Change Prevention service of Trend Micro Apex One and Apex One as a Service could allow a local attacker to elevate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.