
CVE-2024-48904 – Trend Micro Cloud Edge REST API Command Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-48904
17 Oct 2024 — An command injection vulnerability in Trend Micro Cloud Edge could allow a remote attacker to execute arbitrary code on affected appliances. Please note: authentication is not required in order to exploit this vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Cloud Edge. Authentication is not required to exploit this vulnerability. The specific flaw exists within the REST API, which listens on TCP port 8443 by default. The issue resu... • https://github.com/zetraxz/CVE-2024-48904 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2024-46902 – Trend Micro Deep Discovery Inspector SQL Injection Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2024-46902
17 Sep 2024 — A vulnerability in Trend Micro Deep Discovery Inspector (DDI) versions 5.8 and above could allow an attacker to disclose sensitive information affected installations. Please note: an attacker must first obtain the ability to execute high-privileged code (admin user rights) on the target system in order to exploit this vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trend Micro Deep Discovery Inspector. Authentication is required to exp... • https://success.trendmicro.com/en-US/solution/KA-0017793 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2024-46903 – Trend Micro Deep Discovery Inspector SQL Injection Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2024-46903
17 Sep 2024 — A vulnerability in Trend Micro Deep Discovery Inspector (DDI) versions 5.8 and above could allow an attacker to disclose sensitive information affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trend Micro Deep Discovery Inspector. Authentication is required to exploit this vulnerabili... • https://success.trendmicro.com/en-US/solution/KA-0017793 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2024-41183 – Trend Micro VPN Proxy One Pro Link Following Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-41183
30 Jul 2024 — Trend Micro VPN, version 5.8.1012 and below is vulnerable to an arbitrary file overwrite under specific conditions that can lead to elevation of privileges. This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro VPN Proxy One Pro. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DEP Manager. By creating a symbolic link, an attacker can ab... • https://helpcenter.trendmicro.com/en-us/article/tmka-14460 • CWE-73: External Control of File Name or Path •

CVE-2024-39753 – Trend Micro Apex One modOSCE SQL Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-39753
05 Jul 2024 — An modOSCE SQL Injection vulnerability in Trend Micro Apex One could allow a remote attacker to execute arbitrary code on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Apex One. Authentication is required to exploit this vulnerability. The specific flaw exists within the clien... • https://success.trendmicro.com/en-US/solution/ka-0016669 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2024-36473 – Trend Micro VPN Proxy One Pro Link Following Denial-of-Service Vulnerability
https://notcve.org/view.php?id=CVE-2024-36473
10 Jun 2024 — Trend Micro VPN Proxy One Pro, version 5.8.1012 and below is vulnerable to an arbitrary file overwrite or create attack but is limited to local Denial of Service (DoS) and under specific conditions can lead to elevation of privileges. Trend Micro VPN Proxy One Pro, versión 5.8.1012 y anteriores es vulnerable a un ataque de creación o sobrescritura de archivos arbitrario, pero está limitado a la denegación de servicio (DoS) local y, en condiciones específicas, puede provocar una elevación de privilegios. Thi... • https://helpcenter.trendmicro.com/en-us/article/tmka-07247 • CWE-73: External Control of File Name or Path •

CVE-2024-36302 – Trend Micro Apex One Origin Validation Error Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-36302
06 Jun 2024 — An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2024-36303. Una vulnerabilidad de validación de origen en el agente de seguridad Trend Micro Apex One podría permitir a un atacante local escalar pr... • https://success.trendmicro.com/dcx/s/solution/000298063 • CWE-346: Origin Validation Error •

CVE-2024-36303 – Trend Micro Apex One Origin Validation Error Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-36303
06 Jun 2024 — An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2024-36302. Una vulnerabilidad de validación de origen en el agente de seguridad Trend Micro Apex One podría permitir a un atacante local escalar pr... • https://success.trendmicro.com/dcx/s/solution/000298063 • CWE-346: Origin Validation Error •

CVE-2024-36304 – Trend Micro Apex One Security Agent Time-Of-Check Time-Of-Use Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-36304
06 Jun 2024 — A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de tiempo de verificación de tiempo de uso en Trend Micro Apex One y Apex One como agente de servicio podría permitir a un atacante local escalar privilegios en las ... • https://success.trendmicro.com/dcx/s/solution/000298063 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2024-36305 – Trend Micro Apex One Security Agent Link Following Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-36305
06 Jun 2024 — A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Un enlace de agente de seguridad tras una vulnerabilidad en Trend Micro Apex One podría permitir a un atacante local escalar privilegios en las instalaciones afectadas. Tenga en cuenta: un atacante primero debe obten... • https://success.trendmicro.com/dcx/s/solution/000298063 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •