Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Apex_one
(Trendmicro)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 136 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-10-28 | CVE-2019-18188 | Trend Micro Apex One could be exploited by an attacker utilizing a command injection vulnerability to extract files from an arbitrary zip file to a specific folder on the Apex One server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to the IUSR account, which has restricted permission and is unable to make major system changes. An attempted attack requires user authentication. | Apex_one | 7.5 | ||
2020-03-18 | CVE-2020-8598 | Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) server contains a vulnerable service DLL file that could allow a remote attacker to execute arbitrary code on affected installations with SYSTEM level privileges. Authentication is not required to exploit this vulnerability. | Apex_one, Officescan, Worry\-Free_business_security | 9.8 | ||
2020-03-18 | CVE-2020-8470 | Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) server contains a vulnerable service DLL file that could allow an attacker to delete any file on the server with SYSTEM level privileges. Authentication is not required to exploit this vulnerability. | Apex_one, Officescan, Worry\-Free_business_security | 7.5 | ||
2020-09-29 | CVE-2020-24563 | A vulnerability in Trend Micro Apex One may allow a local attacker to manipulate the process of the security agent unload option (if configured), which then could be manipulated to gain a privilege escalation and code execution. An attacker must first obtain the ability to execute low-privileged code on the target in order to exploit this vulnerability. | Apex_one | 7.8 | ||
2020-11-18 | CVE-2020-28572 | A vulnerability in Trend Micro Apex One could allow an unprivileged user to abuse the product installer to reinstall the agent with additional malicious code in the context of a higher privilege. | Apex_one | 7.8 | ||
2020-12-01 | CVE-2020-28573 | An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal the total agents managed by the server. | Apex_one, Officescan | 5.3 | ||
2020-12-01 | CVE-2020-28576 | An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version and build information. | Apex_one, Officescan | 5.3 | ||
2020-12-01 | CVE-2020-28577 | An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal server hostname and db names. | Apex_one, Officescan | 5.3 | ||
2020-12-01 | CVE-2020-28582 | An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal number of managed agents. | Apex_one, Officescan | 5.3 | ||
2020-12-01 | CVE-2020-28583 | An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version, build and patch information. | Apex_one, Officescan | 5.3 |