All the vulnerabilites related to Trend Micro, Inc. - Apex Central
jvndb-2022-001494
Vulnerability from jvndb
Published
2022-03-31 17:25
Modified
2022-03-31 17:25
Severity ?
Summary
Trend Micro Apex Central and Trend Micro Apex Central as a Service vulnerable to improper check for file contents
Details
Trend Micro Apex Central and Trend Micro Apex Central as a Service provided by Trend Micro Incorporated are vulnerable to improper check for file contents (CWE-345, CVE-2022-26871).
Trend Micro Incorporated states that attacks has been observed.
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/vu/JVNVU99107357/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2022-26871 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2022-26871 | |
JPCERT-WR | https://www.jpcert.or.jp/english/at/2022/at220008.html | |
CISA Known Exploited Vulnerabilities Catalog | https://cisa.gov/known-exploited-vulnerabilities-catalog | |
Insufficient Verification of Data Authenticity(CWE-345) | https://cwe.mitre.org/data/definitions/345.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro, Inc. | Apex Central |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001494.html", "dc:date": "2022-03-31T17:25+09:00", "dcterms:issued": "2022-03-31T17:25+09:00", "dcterms:modified": "2022-03-31T17:25+09:00", "description": "Trend Micro Apex Central and Trend Micro Apex Central as a Service provided by Trend Micro Incorporated are vulnerable to improper check for file contents (CWE-345, CVE-2022-26871).\r\n\r\nTrend Micro Incorporated states that attacks has been observed.\r\n\r\nTrend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001494.html", "sec:cpe": { "#text": "cpe:/a:trendmicro:apex_central", "@product": "Apex Central", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, "sec:cvss": [ { "@score": "7.5", "@severity": "High", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "@version": "2.0" }, { "@score": "8.6", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "@version": "3.0" } ], "sec:identifier": "JVNDB-2022-001494", "sec:references": [ { "#text": "http://jvn.jp/en/vu/JVNVU99107357/index.html", "@id": "JVNVU#99107357", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-26871", "@id": "CVE-2022-26871", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-26871", "@id": "CVE-2022-26871", "@source": "NVD" }, { "#text": "https://www.jpcert.or.jp/english/at/2022/at220008.html", "@id": "JPCERT-AT-2022-0008", "@source": "JPCERT-WR" }, { "#text": "https://cisa.gov/known-exploited-vulnerabilities-catalog", "@id": "CVE-2022-26871", "@source": "CISA Known Exploited Vulnerabilities Catalog" }, { "#text": "https://cwe.mitre.org/data/definitions/345.html", "@id": "CWE-345", "@title": "Insufficient Verification of Data Authenticity(CWE-345)" } ], "title": "Trend Micro Apex Central and Trend Micro Apex Central as a Service vulnerable to improper check for file contents" }
jvndb-2023-002100
Vulnerability from jvndb
Published
2023-06-14 14:47
Modified
2024-05-23 15:23
Severity ?
Summary
Security updates for multiple Trend Micro products for enterprises (June 2023)
Details
Trend Micro Incorporated has released security updates for multiple Trend Micro products for enterprises. For more details, refer to the information provided by the developer.
Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002100.html", "dc:date": "2024-05-23T15:23+09:00", "dcterms:issued": "2023-06-14T14:47+09:00", "dcterms:modified": "2024-05-23T15:23+09:00", "description": "Trend Micro Incorporated has released security updates for multiple Trend Micro products for enterprises. For more details, refer to the information provided by the developer.\r\n\r\nTrend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002100.html", "sec:cpe": [ { "#text": "cpe:/a:trendmicro:apex_central", "@product": "Apex Central", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:apex_one", "@product": "Apex One", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:trendmicro:mobile_security", "@product": "Trend Micro Mobile Security", "@vendor": "Trend Micro, Inc.", "@version": "2.2" } ], "sec:cvss": { "@score": "9.8", "@severity": "Critical", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2023-002100", "sec:references": [ { "#text": "https://jvn.jp/en/vu/JVNVU91852506/", "@id": "JVNVU#91852506", "@source": "JVN" }, { "#text": "https://jvn.jp/en/vu/JVNVU93384719/index.html", "@id": "JVNVU#93384719", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32521", "@id": "CVE-2023-32521", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32522", "@id": "CVE-2023-32522", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32523", "@id": "CVE-2023-32523", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32524", "@id": "CVE-2023-32524", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32525", "@id": "CVE-2023-32525", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32526", "@id": "CVE-2023-32526", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32527", "@id": "CVE-2023-32527", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32528", "@id": "CVE-2023-32528", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-30902", "@id": "CVE-2023-30902", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32552", "@id": "CVE-2023-32552", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32553", "@id": "CVE-2023-32553", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32554", "@id": "CVE-2023-32554", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32555", "@id": "CVE-2023-32555", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32556", "@id": "CVE-2023-32556", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32557", "@id": "CVE-2023-32557", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34144", "@id": "CVE-2023-34144", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34145", "@id": "CVE-2023-34145", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34146", "@id": "CVE-2023-34146", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34147", "@id": "CVE-2023-34147", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34148", "@id": "CVE-2023-34148", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32529", "@id": "CVE-2023-32529", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32530", "@id": "CVE-2023-32530", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32531", "@id": "CVE-2023-32531", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32532", "@id": "CVE-2023-32532", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32533", "@id": "CVE-2023-32533", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32534", "@id": "CVE-2023-32534", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32535", "@id": "CVE-2023-32535", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32536", "@id": "CVE-2023-32536", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32537", "@id": "CVE-2023-32537", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32604", "@id": "CVE-2023-32604", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32605", "@id": "CVE-2023-32605", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-30902", "@id": "CVE-2023-30902", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32521", "@id": "CVE-2023-32521", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32522", "@id": "CVE-2023-32522", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32523", "@id": "CVE-2023-32523", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32524", "@id": "CVE-2023-32524", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32525", "@id": "CVE-2023-32525", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32526", "@id": "CVE-2023-32526", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32527", "@id": "CVE-2023-32527", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32528", "@id": "CVE-2023-32528", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32552", "@id": "CVE-2023-32552", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32553", "@id": "CVE-2023-32553", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32554", "@id": "CVE-2023-32554", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32555", "@id": "CVE-2023-32555", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32556", "@id": "CVE-2023-32556", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32557", "@id": "CVE-2023-32557", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34144", "@id": "CVE-2023-34144", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34145", "@id": "CVE-2023-34145", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34146", "@id": "CVE-2023-34146", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34147", "@id": "CVE-2023-34147", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32529", "@id": "CVE-2023-32529", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32530", "@id": "CVE-2023-32530", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32531", "@id": "CVE-2023-32531", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32532", "@id": "CVE-2023-32532", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32533", "@id": "CVE-2023-32533", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32534", "@id": "CVE-2023-32534", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32535", "@id": "CVE-2023-32535", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32536", "@id": "CVE-2023-32536", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32537", "@id": "CVE-2023-32537", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32604", "@id": "CVE-2023-32604", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32605", "@id": "CVE-2023-32605", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34148", "@id": "CVE-2023-34148", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-22", "@title": "Path Traversal(CWE-22)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-287", "@title": "Improper Authentication(CWE-287)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-noinfo", "@title": "No Mapping(CWE-noinfo)" }, { "#text": "https://cwe.mitre.org/data/definitions/367.html", "@id": "CWE-367", "@title": "Time-of-check Time-of-use (TOCTOU) Race Condition(CWE-367)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-59", "@title": "Link Following(CWE-59)" }, { "#text": "https://cwe.mitre.org/data/definitions/426.html", "@id": "CWE-426", "@title": "Untrusted Search Path(CWE-426)" }, { "#text": "https://cwe.mitre.org/data/definitions/269.html", "@id": "CWE-269", "@title": "Improper Privilege Management(CWE-269)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-89", "@title": "SQL Injection(CWE-89)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "Security updates for multiple Trend Micro products for enterprises (June 2023)" }
jvndb-2023-002796
Vulnerability from jvndb
Published
2023-08-10 16:04
Modified
2024-03-13 17:58
Severity ?
Summary
Multiple server-side request forgery vulnerabilities in Trend Micro Apex Central (July 2023)
Details
Trend Micro Apex Central is vulnerable to multiple server-side request forgeries.
Trend Micro Incorporated has released Patch 5 (build 6481) for Trend Micro Apex Central.
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro, Inc. | Apex Central |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002796.html", "dc:date": "2024-03-13T17:58+09:00", "dcterms:issued": "2023-08-10T16:04+09:00", "dcterms:modified": "2024-03-13T17:58+09:00", "description": "Trend Micro Apex Central is vulnerable to multiple server-side request forgeries.\r\nTrend Micro Incorporated has released Patch 5 (build 6481) for Trend Micro Apex Central.\r\n\r\nTrend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.", "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002796.html", "sec:cpe": { "#text": "cpe:/a:trendmicro:apex_central", "@product": "Apex Central", "@vendor": "Trend Micro, Inc.", "@version": "2.2" }, "sec:cvss": { "@score": "5.4", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "@version": "3.0" }, "sec:identifier": "JVNDB-2023-002796", "sec:references": [ { "#text": "http://jvn.jp/en/vu/JVNVU98367862/index.html", "@id": "JVNVU#98367862", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-38624", "@id": "CVE-2023-38624", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-38625", "@id": "CVE-2023-38625", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-38626", "@id": "CVE-2023-38626", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2023-38627", "@id": "CVE-2023-38627", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-38624", "@id": "CVE-2023-38624", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-38625", "@id": "CVE-2023-38625", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-38626", "@id": "CVE-2023-38626", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-38627", "@id": "CVE-2023-38627", "@source": "NVD" }, { "#text": "https://cwe.mitre.org/data/definitions/918.html", "@id": "CWE-918", "@title": "Server-Side Request Forgery (SSRF)(CWE-918)" } ], "title": "Multiple server-side request forgery vulnerabilities in Trend Micro Apex Central (July 2023)" }