Trend Micro Apex One/Apex One as a Service link following

A vulnerability was found in Trend Micro Apex One and Apex One as a Service (the affected version unknown). It has been classified as critical. This affects an unknown part. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

119

Field

exploit_price_0day1
vulnerability_cvss3_meta_tempscore1
vulnerability_cvss3_meta_basescore1
vulnerability_cvss3_vuldb_tempscore1
vulnerability_cvss3_vuldb_basescore1

Commit Conf

90%27
50%11

Approve Conf

90%27
80%11
IDCommitedUserFieldChangeRemarksAcceptedReasonC
1301248209/20/2022VulD...price_0day$5k-$25ksee exploit price documentation09/20/2022accepted
90
1301248109/20/2022VulD...cvss3_meta_tempscore6.3see CVSS documentation09/20/2022accepted
90
1301248009/20/2022VulD...cvss3_meta_basescore6.3see CVSS documentation09/20/2022accepted
90
1301247909/20/2022VulD...cvss3_vuldb_tempscore6.3see CVSS documentation09/20/2022accepted
90
1301247809/20/2022VulD...cvss3_vuldb_basescore6.3see CVSS documentation09/20/2022accepted
90
1301247709/20/2022VulD...cvss2_vuldb_tempscore6.5see CVSS documentation09/20/2022accepted
90
1301247609/20/2022VulD...cvss2_vuldb_basescore6.5see CVSS documentation09/20/2022accepted
90
1301247509/20/2022VulD...cvss3_vuldb_rlXderived from historical data09/20/2022accepted
80
1301247409/20/2022VulD...cvss3_vuldb_eXderived from historical data09/20/2022accepted
80
1301247309/20/2022VulD...cvss2_vuldb_rlNDderived from historical data09/20/2022accepted
80
1301247209/20/2022VulD...cvss2_vuldb_eNDderived from historical data09/20/2022accepted
80
1301247109/20/2022VulD...cvss2_vuldb_auSderived from historical data09/20/2022accepted
80
1301247009/20/2022VulD...cvss2_vuldb_rcCderived from vuldb v3 vector09/20/2022accepted
80
1301246909/20/2022VulD...cvss2_vuldb_aiPderived from vuldb v3 vector09/20/2022accepted
80
1301246809/20/2022VulD...cvss2_vuldb_iiPderived from vuldb v3 vector09/20/2022accepted
80
1301246709/20/2022VulD...cvss2_vuldb_ciPderived from vuldb v3 vector09/20/2022accepted
80
1301246609/20/2022VulD...cvss2_vuldb_acLderived from vuldb v3 vector09/20/2022accepted
80
1301246509/20/2022VulD...cvss2_vuldb_avNderived from vuldb v3 vector09/20/2022accepted
80
1301246409/20/2022VulD...date1663624800 (09/20/2022)09/20/2022accepted
90
1301246309/20/2022VulD...cve_nvd_summaryA security link following local privilege escalation vulnerability in Trend Micro Apex One and Trend Micro Apex One as a Service agents could allow a local attacker to create a writable folder in an arbitrary location and escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.cve.org09/20/2022accepted
90

18 more entries are not shown

Do you want to use VulDB in your project?

Use the official API to access entries easily!