Page 12 of 140 results (0.009 seconds)

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

A vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service could allow an attacker to bypass the product's login authentication by falsifying request parameters on affected installations. Una vulnerabilidad en Trend Micro Apex One y Trend Micro Apex One as a Service podría permitir a un atacante omitir la autenticación de inicio de sesión del producto al falsificar los parámetros de petición en las instalaciones afectadas • https://appweb.trendmicro.com/SupportNews/NewsDetail.aspx?id=4553 https://jvn.jp/en/jp/JVN36454862/index.html https://success.trendmicro.com/solution/000291528 https://www.ipa.go.jp/security/ciadr/vul/20220913-jvn.html • CWE-287: Improper Authentication •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 1

An origin validation error vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to cause a denial-of-service on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de error de comprobación de origen en Trend Micro Apex One y Apex One as a Service podría permitir a un atacante local causar una denegación de servicio en las instalaciones afectadas. Nota: un atacante debe obtener primero la capacidad de ejecutar código con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Apex One NT Listener service. • https://github.com/ipsBruno/CVE-2022-40140-SCANNER https://success.trendmicro.com/solution/000291528 https://www.zerodayinitiative.com/advisories/ZDI-22-1189 • CWE-346: Origin Validation Error •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

A security link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service agents could allow a local attacker to create a writable folder in an arbitrary location and escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Un enlace de seguridad que sigue a la vulnerabilidad de escalada de privilegios local en los agentes Trend Micro Apex One y Trend Micro Apex One as a Service podría permitir a un atacante local crear una carpeta con capacidad de escritura en una ubicación arbitraria y escalar privilegios en las instalaciones afectadas. Nota: un atacante debe obtener primero la capacidad de ejecutar código con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the NT Apex One RealTime Scan Service. • https://success.trendmicro.com/solution/000291528 https://www.zerodayinitiative.com/advisories/ZDI-22-1190 • CWE-269: Improper Privilege Management •

CVSS: 7.3EPSS: 0%CPEs: 3EXPL: 0

A link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service servers could allow a local attacker to abuse an insecure directory that could allow a low-privileged user to run arbitrary code with elevated privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de escalada de privilegios local en los servidores de Trend Micro Apex One y Trend Micro Apex One as a Service podría permitir a un atacante local abusar de un directorio no seguro que podría permitir a un usuario poco privilegiado ejecutar código arbitrario con altos privilegios. Nota: un atacante debe obtener primero la capacidad de ejecutar código con pocos privilegios en el sistema de destino para poder explotar esta vulnerabilidad This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Local Web Classification Service. • https://success.trendmicro.com/solution/000291528 https://www.zerodayinitiative.com/advisories/ZDI-22-1191 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

A link following vulnerability in the scanning function of Trend Micro Apex One and Worry-Free Business Security agents could allow a local attacker to escalate privileges on affected installations. The resolution for this issue has been deployed automatically via ActiveUpdate to customers in an updated Spyware pattern. Customers who are up-to-date on detection patterns are not required to take any additional steps to mitigate this issue. Una vulnerabilidad de seguimiento de enlaces en la función scanning de los agentes de Trend Micro Apex One y Worry-Free Business Security podría permitir a un atacante local escalar privilegios en las instalaciones afectadas. La resolución de este problema se ha desplegado automáticamente por medio de ActiveUpdate a clientes con un patrón de Spyware actualizado. • https://success.trendmicro.com/solution/000291267 https://www.zerodayinitiative.com/advisories/ZDI-22-1033 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •