Show filters
156 Total Results
Displaying 1-10 of 156
Sort by:
Attacker Value
High
CVE-2023-41179
Disclosure Date: September 19, 2023 (last updated October 08, 2023)
A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation.
Note that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.
2
Attacker Value
Unknown
CVE-2020-8468
Disclosure Date: March 18, 2020 (last updated February 21, 2025)
Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) agents are affected by a content validation escape vulnerability which could allow an attacker to manipulate certain agent client components. An attempted attack requires user authentication.
1
Attacker Value
Low
CVE-2022-26871
Disclosure Date: March 29, 2022 (last updated October 07, 2023)
An arbitrary file upload vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to upload an arbitrary file which could lead to remote code execution.
1
Attacker Value
Unknown
CVE-2022-40144
Disclosure Date: September 19, 2022 (last updated November 08, 2023)
A vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service could allow an attacker to bypass the product's login authentication by falsifying request parameters on affected installations.
1
Attacker Value
Unknown
CVE-2022-40143
Disclosure Date: September 19, 2022 (last updated October 08, 2023)
A link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service servers could allow a local attacker to abuse an insecure directory that could allow a low-privileged user to run arbitrary code with elevated privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
1
Attacker Value
Unknown
CVE-2022-40142
Disclosure Date: September 19, 2022 (last updated October 08, 2023)
A security link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service agents could allow a local attacker to create a writable folder in an arbitrary location and escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
1
Attacker Value
Unknown
CVE-2022-40141
Disclosure Date: September 19, 2022 (last updated October 08, 2023)
A vulnerability in Trend Micro Apex One and Apex One as a Service could allow an attacker to intercept and decode certain communication strings that may contain some identification attributes of a particular Apex One server.
1
Attacker Value
Unknown
CVE-2022-40140
Disclosure Date: September 19, 2022 (last updated October 08, 2023)
An origin validation error vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to cause a denial-of-service on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
1
Attacker Value
Unknown
CVE-2022-40139
Disclosure Date: September 19, 2022 (last updated February 13, 2025)
Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution. Please note: an attacker must first obtain Apex One server administration console access in order to exploit this vulnerability.
1
Attacker Value
Unknown
CVE-2024-55917
Disclosure Date: December 31, 2024 (last updated January 02, 2025)
An origin validation error vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
0