Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
trendmicro apex one 2019 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2020-8468
Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) agents are affected by a content validation escape vulnerability which could allow an malicious user to manipulate certain agent client components. An attempted attack requires user authe...
Trendmicro Officescan Xg
Trendmicro Apex One 2019
Trendmicro Worry-free Business Security 9.5
Trendmicro Worry-free Business Security 10.0
Trendmicro Worry-free Business Security 9.0
8.8
CVSSv3
CVE-2020-8467
A migration tool component of Trend Micro Apex One (2019) and OfficeScan XG contains a vulnerability which could allow remote malicious users to execute arbitrary code on affected installations (RCE). An attempted attack requires user authentication.
Trendmicro Apex One 2019
Trendmicro Officescan Xg
7.8
CVSSv3
CVE-2023-47194
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-47196
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-47192
An agent link vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to explo...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-47193
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-47195
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-47197
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-47198
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-47199
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »