Description
A local file inclusion vulnerability in one of Trend Micro Apex Central's widgets could allow a remote attacker to execute arbitrary code on affected installations.
Please note: this vulnerability must be used in conjunction with another one to exploit an affected system. In addition, an attacker must first obtain a valid set of credentials on target system in order to exploit this vulnerability.
Please note: this vulnerability must be used in conjunction with another one to exploit an affected system. In addition, an attacker must first obtain a valid set of credentials on target system in order to exploit this vulnerability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-56982 | A local file inclusion vulnerability in one of Trend Micro Apex Central's widgets could allow a remote attacker to execute arbitrary code on affected installations. Please note: this vulnerability must be used in conjunction with another one to exploit an affected system. In addition, an attacker must first obtain a valid set of credentials on target system in order to exploit this vulnerability. |
References
History
Mon, 22 Dec 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:*:*:*:* |
Wed, 11 Jun 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Sep 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-98 |
Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2025-06-11T16:54:38.294Z
Reserved: 2024-01-08T19:08:00.320Z
Link: CVE-2023-52325
Updated: 2024-08-02T22:55:41.389Z
Status : Modified
Published: 2024-01-23T21:15:09.383
Modified: 2025-12-22T13:53:51.647
Link: CVE-2023-52325
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD