cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-35695,https://securityvulnerability.io/vulnerability/CVE-2023-35695,Sensitive Information Disclosure in Trend Micro Mobile Security by Trend Micro,"A vulnerability exists in Trend Micro Mobile Security (Enterprise) 9.8 SP5 that enables a remote attacker to download specific log files. These log files may contain sensitive information related to the product, potentially compromising the privacy and security of users. Organizations are advised to address this issue promptly to safeguard against unauthorized access.",Trend Micro,Trend Micro Moibile Security For Enterprise,7.5,HIGH,0.0029899999499320984,false,false,false,false,,false,false,2023-06-26T22:15:00.000Z,0 CVE-2023-32521,https://securityvulnerability.io/vulnerability/CVE-2023-32521,Path Traversal Vulnerability in Trend Micro Mobile Security Service DLL,A path traversal vulnerability exists in a specific service DLL of Trend Micro Mobile Security (Enterprise) version 9.8 SP5. This flaw may allow an unauthenticated remote attacker to exploit the vulnerability and potentially delete arbitrary files on the server. Proper security measures and patches are recommended to mitigate this issue.,Trend Micro,Trend Micro Moibile Security For Enterprise,9.1,CRITICAL,0.0025100000202655792,false,false,false,false,,false,false,2023-06-26T22:15:00.000Z,0 CVE-2023-32522,https://securityvulnerability.io/vulnerability/CVE-2023-32522,Path Traversal Vulnerability in Trend Micro Mobile Security Solution,"A path traversal vulnerability in Trend Micro Mobile Security (Enterprise) 9.8 SP5 potentially allows an authenticated remote attacker to delete arbitrary files on the system. This exploitation requires the attacker to have the ability to execute low-privileged code, making it a nuanced risk. Proper configurations and monitoring are vital to mitigate this security issue and protect sensitive data.",Trend Micro,Trend Micro Moibile Security For Enterprise,8.1,HIGH,0.001610000035725534,false,false,false,false,,false,false,2023-06-26T22:15:00.000Z,0 CVE-2023-32523,https://securityvulnerability.io/vulnerability/CVE-2023-32523,Authentication Bypass in Trend Micro Mobile Security,"Certain versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 have vulnerabilities within various widgets that can allow a remote user to circumvent authentication processes. This flaw may be exploited in conjunction with other vulnerabilities, enabling more severe attacks. Note that exploitation requires the attacker to first execute low-privileged code on the targeted system, highlighting the importance of maintaining robust coding practices and system security.",Trend Micro,Trend Micro Moibile Security For Enterprise,8.8,HIGH,0.006949999835342169,false,false,false,false,,false,false,2023-06-26T22:15:00.000Z,0 CVE-2023-32524,https://securityvulnerability.io/vulnerability/CVE-2023-32524,Remote Authentication Bypass in Trend Micro Mobile Security Enterprise,"Trend Micro Mobile Security (Enterprise) version 9.8 SP5 contains certain widgets that can be exploited by a remote attacker to bypass authentication controls. This vulnerability requires an attacker to first gain access to execute low-privileged code within the targeted system, allowing this bypass to potentially be chained with other vulnerabilities for greater impact. The nature of this vulnerability emphasizes the importance of strengthening security measures and applying updates to protect against such exploit attempts.",Trend Micro,Trend Micro Moibile Security For Enterprise,8.8,HIGH,0.006949999835342169,false,false,false,false,,false,false,2023-06-26T22:15:00.000Z,0 CVE-2023-32525,https://securityvulnerability.io/vulnerability/CVE-2023-32525,,"Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote attacker to create arbitrary files on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32526.",Trend Micro,Trend Micro Moibile Security For Enterprise,6.5,MEDIUM,0.0014700000174343586,false,false,false,false,,false,false,2023-06-26T22:15:00.000Z,0 CVE-2023-32526,https://securityvulnerability.io/vulnerability/CVE-2023-32526,,"Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote attacker to create arbitrary files on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32525.",Trend Micro,Trend Micro Moibile Security For Enterprise,6.5,MEDIUM,0.0014700000174343586,false,false,false,false,,false,false,2023-06-26T22:15:00.000Z,0 CVE-2023-32527,https://securityvulnerability.io/vulnerability/CVE-2023-32527,Remote Code Execution Vulnerability in Trend Micro Mobile Security,"A vulnerability in Trend Micro Mobile Security (Enterprise) version 9.8 SP5 allows remote attackers to execute arbitrary code through manipulated .php files. To exploit this flaw, attackers must first acquire low-privileged access to the target system. This vulnerability poses significant risks to the security of affected installations, enabling malicious users to potentially lead to further unauthorized actions on the compromised systems. Security teams should ensure prompt mitigation strategies are in place to protect against this threat.",Trend Micro,Trend Micro Moibile Security For Enterprise,8.8,HIGH,0.024630000814795494,false,false,false,false,,false,false,2023-06-26T22:15:00.000Z,0 CVE-2023-32528,https://securityvulnerability.io/vulnerability/CVE-2023-32528,Remote Code Execution Vulnerability in Trend Micro Mobile Security by Trend Micro,"Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerabilities in its PHP files that can potentially allow remote attackers to execute arbitrary code on affected systems. Exploiting this vulnerability requires an attacker to have low-privileged access to the target system first, making it essential for organizations to implement proper security measures to mitigate risks.",Trend Micro,Trend Micro Moibile Security For Enterprise,8.8,HIGH,0.024630000814795494,false,false,false,false,,false,false,2023-06-26T22:15:00.000Z,0