Trend Micro Deep Security Agent 20.0 Update 6313 Long Term Support

CPE Details

Trend Micro Deep Security Agent 20.0 Update 6313 Long Term Support
20.0
2024-01-30
12h37 +00:00
2024-01-30
12h37 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:trendmicro:deep_security_agent:20.0:update6313:*:*:long_term_support:*:*:*

Informations

Vendor

trendmicro

Product

deep_security_agent

Version

20.0

Update

update6313

Software Edition

long_term_support

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-52338 2024-01-23 20h43 +00:00 A link following vulnerability in the Trend Micro Deep Security 20.0 and Trend Micro Cloud One - Endpoint and Workload Security Agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
7.8
Haute
CVE-2023-52337 2024-01-23 20h42 +00:00 An improper access control vulnerability in Trend Micro Deep Security 20.0 and Trend Micro Cloud One - Endpoint and Workload Security Agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
7.8
Haute
CVE-2022-23120 2022-01-20 17h11 +00:00 A code injection vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to escalate privileges and run arbitrary code in the context of root. Please note: an attacker must first obtain access to the target agent in an un-activated and unconfigured state in order to exploit this vulnerability.
7.8
Haute
CVE-2022-23119 2022-01-20 17h11 +00:00 A directory traversal vulnerability in Trend Micro Deep Security and Cloud One - Workload Security Agent for Linux version 20 and below could allow an attacker to read arbitrary files from the file system. Please note: an attacker must first obtain compromised access to the target Deep Security Manager (DSM) or the target agent must be not yet activated or configured in order to exploit this vulnerability.
7.5
Haute