Lucene search

K
TrendmicroApex Central2019

11 matches found

CVE
CVE
added 2024/01/23 9:15 p.m.46 views

CVE-2023-38624

A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly. Please note: an attacker must first obtain the ability to execute low-privileged code on the t...

5.4CVSS5.4AI score0.00148EPSS
CVE
CVE
added 2024/01/23 9:15 p.m.46 views

CVE-2023-52324

An unrestricted file upload vulnerability in Trend Micro Apex Central could allow a remote attacker to create arbitrary files on affected installations. Please note: although authentication is required to exploit this vulnerability, this vulnerability could be exploited when the attacker has any va...

8.8CVSS9AI score0.03859EPSS
CVE
CVE
added 2024/01/23 9:15 p.m.38 views

CVE-2023-52328

Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers. Please note this vulnerability is similar, but not identical to CVE-2023-52329.

6.1CVSS6.3AI score0.00582EPSS
CVE
CVE
added 2024/01/23 9:15 p.m.37 views

CVE-2023-38626

A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly. Please note: an attacker must first obtain the ability to execute low-privileged code on the t...

5.4CVSS5.4AI score0.00148EPSS
CVE
CVE
added 2024/01/23 9:15 p.m.37 views

CVE-2023-52325

A local file inclusion vulnerability in one of Trend Micro Apex Central's widgets could allow a remote attacker to execute arbitrary code on affected installations. Please note: this vulnerability must be used in conjunction with another one to exploit an affected system. In addition, an attacker m...

7.5CVSS7.6AI score0.03114EPSS
CVE
CVE
added 2024/01/23 9:15 p.m.37 views

CVE-2023-52329

Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers. Please note this vulnerability is similar, but not identical to CVE-2023-52326.

6.1CVSS6.3AI score0.00582EPSS
CVE
CVE
added 2024/01/23 9:15 p.m.34 views

CVE-2023-38625

A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly. Please note: an attacker must first obtain the ability to execute low-privileged code on the t...

5.4CVSS5.5AI score0.00148EPSS
CVE
CVE
added 2024/01/23 9:15 p.m.33 views

CVE-2023-52326

Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers. Please note this vulnerability is similar, but not identical to CVE-2023-52327.

6.1CVSS6.3AI score0.00582EPSS
CVE
CVE
added 2024/01/23 9:15 p.m.33 views

CVE-2023-52331

A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central could allow an attacker to interact with internal or local services directly. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to expl...

7.1CVSS7AI score0.00203EPSS
CVE
CVE
added 2024/01/23 9:15 p.m.32 views

CVE-2023-52327

Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers. Please note this vulnerability is similar, but not identical to CVE-2023-52328.

6.1CVSS6.3AI score0.00582EPSS
CVE
CVE
added 2024/01/23 9:15 p.m.27 views

CVE-2023-38627

A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly. Please note: an attacker must first obtain the ability to execute low-privileged code on the t...

5.4CVSS5.5AI score0.00148EPSS