Lucene search

K
TrendmicroApex One

6 matches found

CVE
CVE
added 2022/09/19 6:15 p.m.698 views

CVE-2022-40139

Improper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct affected clients to download an unverified rollback package, which could lead to remote code execution....

7.2CVSS7.7AI score0.18386EPSS
CVE
CVE
added 2022/09/19 6:15 p.m.77 views

CVE-2022-40144

A vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service could allow an attacker to bypass the product's login authentication by falsifying request parameters on affected installations.

9.8CVSS9.4AI score0.0016EPSS
CVE
CVE
added 2022/09/19 6:15 p.m.65 views

CVE-2022-40140

An origin validation error vulnerability in Trend Micro Apex One and Apex One as a Service could allow a local attacker to cause a denial-of-service on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to expl...

5.5CVSS5.9AI score0.00092EPSS
CVE
CVE
added 2022/09/19 6:15 p.m.49 views

CVE-2022-40141

A vulnerability in Trend Micro Apex One and Apex One as a Service could allow an attacker to intercept and decode certain communication strings that may contain some identification attributes of a particular Apex One server.

7.5CVSS7.8AI score0.00427EPSS
CVE
CVE
added 2022/09/19 6:15 p.m.45 views

CVE-2022-40143

A link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service servers could allow a local attacker to abuse an insecure directory that could allow a low-privileged user to run arbitrary code with elevated privileges. Please note: an attacker...

7.3CVSS7.6AI score0.00097EPSS
CVE
CVE
added 2022/09/19 6:15 p.m.43 views

CVE-2022-40142

A security link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service agents could allow a local attacker to create a writable folder in an arbitrary location and escalate privileges on affected installations. Please note: an attacker must ...

7.8CVSS8.1AI score0.00092EPSS