cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-32521,https://securityvulnerability.io/vulnerability/CVE-2023-32521,Path Traversal Vulnerability in Trend Micro Mobile Security Service DLL,A path traversal vulnerability exists in a specific service DLL of Trend Micro Mobile Security (Enterprise) version 9.8 SP5. This flaw may allow an unauthenticated remote attacker to exploit the vulnerability and potentially delete arbitrary files on the server. Proper security measures and patches are recommended to mitigate this issue.,Trend Micro,Trend Micro Moibile Security For Enterprise,9.1,CRITICAL,0.0024999999441206455,false,,false,false,false,,,false,false,,2023-06-26T22:15:00.000Z,0 CVE-2023-32522,https://securityvulnerability.io/vulnerability/CVE-2023-32522,Path Traversal Vulnerability in Trend Micro Mobile Security Solution,"A path traversal vulnerability in Trend Micro Mobile Security (Enterprise) 9.8 SP5 potentially allows an authenticated remote attacker to delete arbitrary files on the system. This exploitation requires the attacker to have the ability to execute low-privileged code, making it a nuanced risk. Proper configurations and monitoring are vital to mitigate this security issue and protect sensitive data.",Trend Micro,Trend Micro Moibile Security For Enterprise,8.1,HIGH,0.0020099999383091927,false,,false,false,false,,,false,false,,2023-06-26T22:15:00.000Z,0 CVE-2023-32523,https://securityvulnerability.io/vulnerability/CVE-2023-32523,Authentication Bypass in Trend Micro Mobile Security,"Certain versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 have vulnerabilities within various widgets that can allow a remote user to circumvent authentication processes. This flaw may be exploited in conjunction with other vulnerabilities, enabling more severe attacks. Note that exploitation requires the attacker to first execute low-privileged code on the targeted system, highlighting the importance of maintaining robust coding practices and system security.",Trend Micro,Trend Micro Moibile Security For Enterprise,8.8,HIGH,0.012550000101327896,false,,false,false,false,,,false,false,,2023-06-26T22:15:00.000Z,0 CVE-2023-32524,https://securityvulnerability.io/vulnerability/CVE-2023-32524,Remote Authentication Bypass in Trend Micro Mobile Security Enterprise,"Trend Micro Mobile Security (Enterprise) version 9.8 SP5 contains certain widgets that can be exploited by a remote attacker to bypass authentication controls. This vulnerability requires an attacker to first gain access to execute low-privileged code within the targeted system, allowing this bypass to potentially be chained with other vulnerabilities for greater impact. The nature of this vulnerability emphasizes the importance of strengthening security measures and applying updates to protect against such exploit attempts.",Trend Micro,Trend Micro Moibile Security For Enterprise,8.8,HIGH,0.012550000101327896,false,,false,false,false,,,false,false,,2023-06-26T22:15:00.000Z,0 CVE-2023-32525,https://securityvulnerability.io/vulnerability/CVE-2023-32525,Arbitrary File Creation Vulnerability in Trend Micro Mobile Security,"Trend Micro Mobile Security (Enterprise) 9.8 SP5 is susceptible to security vulnerabilities within its widget functionality, allowing a remote attacker the potential to create arbitrary files on systems where the software is installed. This exploitation requires the attacker to first execute low-privileged code on the target system, presenting a risk if the precondition is met. Understanding the implications of this vulnerability is crucial for maintaining security measures and ensuring that appropriate mitigations are in place.",Trend Micro,Trend Micro Moibile Security For Enterprise,6.5,MEDIUM,0.0017399999778717756,false,,false,false,false,,,false,false,,2023-06-26T22:15:00.000Z,0 CVE-2023-32526,https://securityvulnerability.io/vulnerability/CVE-2023-32526,Remote Code Execution Flaw in Trend Micro Mobile Security,"The Trend Micro Mobile Security (Enterprise) 9.8 SP5 is affected by widget vulnerabilities that could allow a remote attacker to create arbitrary files on the system. To exploit this vulnerability, an attacker must first gain the capability to execute low-privileged code. This presents a significant risk to system integrity, as unauthorized file creation can lead to further exploitation of the system or unauthorized access.",Trend Micro,Trend Micro Moibile Security For Enterprise,6.5,MEDIUM,0.0017399999778717756,false,,false,false,false,,,false,false,,2023-06-26T22:15:00.000Z,0 CVE-2023-32527,https://securityvulnerability.io/vulnerability/CVE-2023-32527,Remote Code Execution Vulnerability in Trend Micro Mobile Security,"A vulnerability in Trend Micro Mobile Security (Enterprise) version 9.8 SP5 allows remote attackers to execute arbitrary code through manipulated .php files. To exploit this flaw, attackers must first acquire low-privileged access to the target system. This vulnerability poses significant risks to the security of affected installations, enabling malicious users to potentially lead to further unauthorized actions on the compromised systems. Security teams should ensure prompt mitigation strategies are in place to protect against this threat.",Trend Micro,Trend Micro Moibile Security For Enterprise,8.8,HIGH,0.029370000585913658,false,,false,false,false,,,false,false,,2023-06-26T22:15:00.000Z,0 CVE-2023-32528,https://securityvulnerability.io/vulnerability/CVE-2023-32528,Remote Code Execution Vulnerability in Trend Micro Mobile Security by Trend Micro,"Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerabilities in its PHP files that can potentially allow remote attackers to execute arbitrary code on affected systems. Exploiting this vulnerability requires an attacker to have low-privileged access to the target system first, making it essential for organizations to implement proper security measures to mitigate risks.",Trend Micro,Trend Micro Moibile Security For Enterprise,8.8,HIGH,0.029370000585913658,false,,false,false,false,,,false,false,,2023-06-26T22:15:00.000Z,0 CVE-2023-35695,https://securityvulnerability.io/vulnerability/CVE-2023-35695,Sensitive Information Disclosure in Trend Micro Mobile Security by Trend Micro,"A vulnerability exists in Trend Micro Mobile Security (Enterprise) 9.8 SP5 that enables a remote attacker to download specific log files. These log files may contain sensitive information related to the product, potentially compromising the privacy and security of users. Organizations are advised to address this issue promptly to safeguard against unauthorized access.",Trend Micro,Trend Micro Moibile Security For Enterprise,7.5,HIGH,0.0033599999733269215,false,,false,false,false,,,false,false,,2023-06-26T22:15:00.000Z,0