Page 9 of 485 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

21 Nov 2022 — Affected builds of Trend Micro Apex One and Apex One as a Service contain a monitor engine component that is complied without the /SAFESEH memory protection mechanism which helps to monitor for malicious payloads. The affected component's memory protection mechanism has been updated to enhance product security. Las compilaciones afectadas de Trend Micro Apex One y Apex One as a Service contienen un componente de motor de monitorización que se cumple sin el mecanismo de protección de memoria /SAFESEH que ayu... • https://success.trendmicro.com/solution/000291770 •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

21 Nov 2022 — An Out-of-bounds read vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not the same as CVE-2022-44648. Una vulnerabilidad de lectura fuera de los límites en Trend Micro Apex One y Apex One as a Service podría permitir a un atacante loca... • https://success.trendmicro.com/solution/000291770 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

21 Nov 2022 — An Out-of-bounds read vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to disclose sensitive information on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not the same as CVE-2022-44647. Una vulnerabilidad de lectura fuera de los límites en Trend Micro Apex One y Apex One as a Service podría permitir a un atacante loca... • https://success.trendmicro.com/solution/000291770 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

21 Nov 2022 — An out-of-bounds access vulnerability in the Unauthorized Change Prevention service of Trend Micro Apex One and Apex One as a Service could allow a local attacker to elevate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de acceso fuera de los límites en el servicio de Prevención de Cambios No Autorizados de Trend Micro Apex One y Apex One as a Service ... • https://success.trendmicro.com/solution/000291770 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

21 Nov 2022 — A memory corruption vulnerability in the Unauthorized Change Prevention service of Trend Micro Apex One and Apex One as a Service could allow a local attacker to elevate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de corrupción de memoria en el servicio de Prevención de Cambios No Autorizados de Trend Micro Apex One y Apex One as a Service podría per... • https://success.trendmicro.com/solution/000291770 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

21 Nov 2022 — A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One and Apex One as a Service agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de Time-of-Check Time-Of-Use en Trend Micro Apex One y Apex One como agente de servicio podría permitir a un atacante local escalar privilegios en las instalaciones ... • https://success.trendmicro.com/solution/000291770 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

21 Nov 2022 — An improper handling of exceptional conditions vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Un manejo inadecuado de la vulnerabilidad de condiciones excepcionales en Trend Micro Apex One y Apex One as a Service podría permitir a un atacante local escalar privilegios ... • https://success.trendmicro.com/solution/000291770 • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

21 Nov 2022 — A security agent directory traversal vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de directory traversal del agente de seguridad en Trend Micro Apex One y Apex One as a Service podría permitir a un atacante local escalar privilegios en las instalac... • https://success.trendmicro.com/solution/000291770 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.7EPSS: 0%CPEs: 3EXPL: 0

10 Oct 2022 — A registry permissions vulnerability in the Trend Micro Apex One Data Loss Prevention (DLP) module could allow a local attacker with administrative credentials to bypass certain elements of the product's anti-tampering mechanisms on affected installations. Please note: an attacker must first obtain administrative credentials on the target system in order to exploit this vulnerability. Una vulnerabilidad de los permisos del registro en el módulo de prevención de pérdida de datos (DLP) de Trend Micro Apex One... • https://success.trendmicro.com/solution/000291645 • CWE-276: Incorrect Default Permissions •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

07 Oct 2022 — A Time-of-Check Time-Of-Use vulnerability in the Trend Micro Apex One Vulnerability Protection integrated component could allow a local attacker to escalate privileges and turn a specific working directory into a mount point on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad del componente integrado Trend Micro Apex One Vulnerability Protection podría permitir a un at... • https://success.trendmicro.com/solution/000291645 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •