All the vulnerabilites related to Trend Micro, Inc. - Apex Central
jvndb-2022-001494
Vulnerability from jvndb
Published
2022-03-31 17:25
Modified
2022-03-31 17:25
Severity ?
Summary
Trend Micro Apex Central and Trend Micro Apex Central as a Service vulnerable to improper check for file contents
Details
Trend Micro Apex Central and Trend Micro Apex Central as a Service provided by Trend Micro Incorporated are vulnerable to improper check for file contents (CWE-345, CVE-2022-26871). Trend Micro Incorporated states that attacks has been observed. Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001494.html",
  "dc:date": "2022-03-31T17:25+09:00",
  "dcterms:issued": "2022-03-31T17:25+09:00",
  "dcterms:modified": "2022-03-31T17:25+09:00",
  "description": "Trend Micro Apex Central and Trend Micro Apex Central as a Service provided by Trend Micro Incorporated are vulnerable to improper check for file contents (CWE-345, CVE-2022-26871).\r\n\r\nTrend Micro Incorporated states that attacks has been observed.\r\n\r\nTrend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.",
  "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-001494.html",
  "sec:cpe": {
    "#text": "cpe:/a:trendmicro:apex_central",
    "@product": "Apex Central",
    "@vendor": "Trend Micro, Inc.",
    "@version": "2.2"
  },
  "sec:cvss": [
    {
      "@score": "7.5",
      "@severity": "High",
      "@type": "Base",
      "@vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "@version": "2.0"
    },
    {
      "@score": "8.6",
      "@severity": "High",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2022-001494",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/vu/JVNVU99107357/index.html",
      "@id": "JVNVU#99107357",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2022-26871",
      "@id": "CVE-2022-26871",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-26871",
      "@id": "CVE-2022-26871",
      "@source": "NVD"
    },
    {
      "#text": "https://www.jpcert.or.jp/english/at/2022/at220008.html",
      "@id": "JPCERT-AT-2022-0008",
      "@source": "JPCERT-WR"
    },
    {
      "#text": "https://cisa.gov/known-exploited-vulnerabilities-catalog",
      "@id": "CVE-2022-26871",
      "@source": "CISA Known Exploited Vulnerabilities Catalog"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/345.html",
      "@id": "CWE-345",
      "@title": "Insufficient Verification of Data Authenticity(CWE-345)"
    }
  ],
  "title": "Trend Micro Apex Central and Trend Micro Apex Central as a Service vulnerable to improper check for file contents"
}

jvndb-2023-002100
Vulnerability from jvndb
Published
2023-06-14 14:47
Modified
2024-05-23 15:23
Severity ?
Summary
Security updates for multiple Trend Micro products for enterprises (June 2023)
Details
Trend Micro Incorporated has released security updates for multiple Trend Micro products for enterprises. For more details, refer to the information provided by the developer. Trend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.
References
JVN https://jvn.jp/en/vu/JVNVU91852506/
JVN https://jvn.jp/en/vu/JVNVU93384719/index.html
CVE https://www.cve.org/CVERecord?id=CVE-2023-32521
CVE https://www.cve.org/CVERecord?id=CVE-2023-32522
CVE https://www.cve.org/CVERecord?id=CVE-2023-32523
CVE https://www.cve.org/CVERecord?id=CVE-2023-32524
CVE https://www.cve.org/CVERecord?id=CVE-2023-32525
CVE https://www.cve.org/CVERecord?id=CVE-2023-32526
CVE https://www.cve.org/CVERecord?id=CVE-2023-32527
CVE https://www.cve.org/CVERecord?id=CVE-2023-32528
CVE https://www.cve.org/CVERecord?id=CVE-2023-30902
CVE https://www.cve.org/CVERecord?id=CVE-2023-32552
CVE https://www.cve.org/CVERecord?id=CVE-2023-32553
CVE https://www.cve.org/CVERecord?id=CVE-2023-32554
CVE https://www.cve.org/CVERecord?id=CVE-2023-32555
CVE https://www.cve.org/CVERecord?id=CVE-2023-32556
CVE https://www.cve.org/CVERecord?id=CVE-2023-32557
CVE https://www.cve.org/CVERecord?id=CVE-2023-34144
CVE https://www.cve.org/CVERecord?id=CVE-2023-34145
CVE https://www.cve.org/CVERecord?id=CVE-2023-34146
CVE https://www.cve.org/CVERecord?id=CVE-2023-34147
CVE https://www.cve.org/CVERecord?id=CVE-2023-34148
CVE https://www.cve.org/CVERecord?id=CVE-2023-32529
CVE https://www.cve.org/CVERecord?id=CVE-2023-32530
CVE https://www.cve.org/CVERecord?id=CVE-2023-32531
CVE https://www.cve.org/CVERecord?id=CVE-2023-32532
CVE https://www.cve.org/CVERecord?id=CVE-2023-32533
CVE https://www.cve.org/CVERecord?id=CVE-2023-32534
CVE https://www.cve.org/CVERecord?id=CVE-2023-32535
CVE https://www.cve.org/CVERecord?id=CVE-2023-32536
CVE https://www.cve.org/CVERecord?id=CVE-2023-32537
CVE https://www.cve.org/CVERecord?id=CVE-2023-32604
CVE https://www.cve.org/CVERecord?id=CVE-2023-32605
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-30902
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32521
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32522
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32523
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32524
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32525
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32526
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32527
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32528
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32552
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32553
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32554
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32555
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32556
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32557
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-34144
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-34145
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-34146
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-34147
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32529
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32530
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32531
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32532
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32533
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32534
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32535
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32536
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32537
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32604
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-32605
NVD https://nvd.nist.gov/vuln/detail/CVE-2023-34148
Path Traversal(CWE-22) https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html
Improper Authentication(CWE-287) https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html
No Mapping(CWE-noinfo) https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html
Time-of-check Time-of-use (TOCTOU) Race Condition(CWE-367) https://cwe.mitre.org/data/definitions/367.html
Link Following(CWE-59) https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html
Untrusted Search Path(CWE-426) https://cwe.mitre.org/data/definitions/426.html
Improper Privilege Management(CWE-269) https://cwe.mitre.org/data/definitions/269.html
SQL Injection(CWE-89) https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html
Cross-site Scripting(CWE-79) https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html
No Mapping(CWE-Other) https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002100.html",
  "dc:date": "2024-05-23T15:23+09:00",
  "dcterms:issued": "2023-06-14T14:47+09:00",
  "dcterms:modified": "2024-05-23T15:23+09:00",
  "description": "Trend Micro Incorporated has released security updates for multiple Trend Micro products for enterprises. For more details, refer to the information provided by the developer.\r\n\r\nTrend Micro Incorporated reported these vulnerabilities to JPCERT/CC to notify users of the solutions through JVN.",
  "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002100.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:trendmicro:apex_central",
      "@product": "Apex Central",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:apex_one",
      "@product": "Apex One",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:mobile_security",
      "@product": "Trend Micro Mobile Security",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "9.8",
    "@severity": "Critical",
    "@type": "Base",
    "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
    "@version": "3.0"
  },
  "sec:identifier": "JVNDB-2023-002100",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/vu/JVNVU91852506/",
      "@id": "JVNVU#91852506",
      "@source": "JVN"
    },
    {
      "#text": "https://jvn.jp/en/vu/JVNVU93384719/index.html",
      "@id": "JVNVU#93384719",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32521",
      "@id": "CVE-2023-32521",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32522",
      "@id": "CVE-2023-32522",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32523",
      "@id": "CVE-2023-32523",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32524",
      "@id": "CVE-2023-32524",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32525",
      "@id": "CVE-2023-32525",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32526",
      "@id": "CVE-2023-32526",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32527",
      "@id": "CVE-2023-32527",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32528",
      "@id": "CVE-2023-32528",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-30902",
      "@id": "CVE-2023-30902",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32552",
      "@id": "CVE-2023-32552",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32553",
      "@id": "CVE-2023-32553",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32554",
      "@id": "CVE-2023-32554",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32555",
      "@id": "CVE-2023-32555",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32556",
      "@id": "CVE-2023-32556",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32557",
      "@id": "CVE-2023-32557",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34144",
      "@id": "CVE-2023-34144",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34145",
      "@id": "CVE-2023-34145",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34146",
      "@id": "CVE-2023-34146",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34147",
      "@id": "CVE-2023-34147",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-34148",
      "@id": "CVE-2023-34148",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32529",
      "@id": "CVE-2023-32529",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32530",
      "@id": "CVE-2023-32530",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32531",
      "@id": "CVE-2023-32531",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32532",
      "@id": "CVE-2023-32532",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32533",
      "@id": "CVE-2023-32533",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32534",
      "@id": "CVE-2023-32534",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32535",
      "@id": "CVE-2023-32535",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32536",
      "@id": "CVE-2023-32536",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32537",
      "@id": "CVE-2023-32537",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32604",
      "@id": "CVE-2023-32604",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-32605",
      "@id": "CVE-2023-32605",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-30902",
      "@id": "CVE-2023-30902",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32521",
      "@id": "CVE-2023-32521",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32522",
      "@id": "CVE-2023-32522",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32523",
      "@id": "CVE-2023-32523",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32524",
      "@id": "CVE-2023-32524",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32525",
      "@id": "CVE-2023-32525",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32526",
      "@id": "CVE-2023-32526",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32527",
      "@id": "CVE-2023-32527",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32528",
      "@id": "CVE-2023-32528",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32552",
      "@id": "CVE-2023-32552",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32553",
      "@id": "CVE-2023-32553",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32554",
      "@id": "CVE-2023-32554",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32555",
      "@id": "CVE-2023-32555",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32556",
      "@id": "CVE-2023-32556",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32557",
      "@id": "CVE-2023-32557",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34144",
      "@id": "CVE-2023-34144",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34145",
      "@id": "CVE-2023-34145",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34146",
      "@id": "CVE-2023-34146",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34147",
      "@id": "CVE-2023-34147",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32529",
      "@id": "CVE-2023-32529",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32530",
      "@id": "CVE-2023-32530",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32531",
      "@id": "CVE-2023-32531",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32532",
      "@id": "CVE-2023-32532",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32533",
      "@id": "CVE-2023-32533",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32534",
      "@id": "CVE-2023-32534",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32535",
      "@id": "CVE-2023-32535",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32536",
      "@id": "CVE-2023-32536",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32537",
      "@id": "CVE-2023-32537",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32604",
      "@id": "CVE-2023-32604",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-32605",
      "@id": "CVE-2023-32605",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-34148",
      "@id": "CVE-2023-34148",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-22",
      "@title": "Path Traversal(CWE-22)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-287",
      "@title": "Improper Authentication(CWE-287)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-noinfo",
      "@title": "No Mapping(CWE-noinfo)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/367.html",
      "@id": "CWE-367",
      "@title": "Time-of-check Time-of-use (TOCTOU) Race Condition(CWE-367)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-59",
      "@title": "Link Following(CWE-59)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/426.html",
      "@id": "CWE-426",
      "@title": "Untrusted Search Path(CWE-426)"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/269.html",
      "@id": "CWE-269",
      "@title": "Improper Privilege Management(CWE-269)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-89",
      "@title": "SQL Injection(CWE-89)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-79",
      "@title": "Cross-site Scripting(CWE-79)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "Security updates for multiple Trend Micro products for enterprises (June 2023)"
}

jvndb-2023-002796
Vulnerability from jvndb
Published
2023-08-10 16:04
Modified
2024-03-13 17:58
Severity ?
Summary
Multiple server-side request forgery vulnerabilities in Trend Micro Apex Central (July 2023)
Details
Trend Micro Apex Central is vulnerable to multiple server-side request forgeries. Trend Micro Incorporated has released Patch 5 (build 6481) for Trend Micro Apex Central. Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002796.html",
  "dc:date": "2024-03-13T17:58+09:00",
  "dcterms:issued": "2023-08-10T16:04+09:00",
  "dcterms:modified": "2024-03-13T17:58+09:00",
  "description": "Trend Micro Apex Central is vulnerable to multiple server-side request forgeries.\r\nTrend Micro Incorporated has released Patch 5 (build 6481) for Trend Micro Apex Central.\r\n\r\nTrend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solution through JVN.",
  "link": "https://jvndb.jvn.jp/en/contents/2023/JVNDB-2023-002796.html",
  "sec:cpe": {
    "#text": "cpe:/a:trendmicro:apex_central",
    "@product": "Apex Central",
    "@vendor": "Trend Micro, Inc.",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "5.4",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
    "@version": "3.0"
  },
  "sec:identifier": "JVNDB-2023-002796",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/vu/JVNVU98367862/index.html",
      "@id": "JVNVU#98367862",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-38624",
      "@id": "CVE-2023-38624",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-38625",
      "@id": "CVE-2023-38625",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-38626",
      "@id": "CVE-2023-38626",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-38627",
      "@id": "CVE-2023-38627",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-38624",
      "@id": "CVE-2023-38624",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-38625",
      "@id": "CVE-2023-38625",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-38626",
      "@id": "CVE-2023-38626",
      "@source": "NVD"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2023-38627",
      "@id": "CVE-2023-38627",
      "@source": "NVD"
    },
    {
      "#text": "https://cwe.mitre.org/data/definitions/918.html",
      "@id": "CWE-918",
      "@title": "Server-Side Request Forgery (SSRF)(CWE-918)"
    }
  ],
  "title": "Multiple server-side request forgery vulnerabilities in Trend Micro Apex Central (July 2023)"
}