Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities.
This is similar to, but not identical to CVE-2023-32524.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-36767 | Affected versions of Trend Micro Mobile Security (Enterprise) 9.8 SP5 contain some widgets that would allow a remote user to bypass authentication and potentially chain with other vulnerabilities. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit these vulnerabilities. This is similar to, but not identical to CVE-2023-32524. |
Wed, 04 Dec 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: trendmicro
Published:
Updated: 2024-12-05T15:21:04.987Z
Reserved: 2023-05-09T16:41:52.156Z
Link: CVE-2023-32523
Updated: 2024-08-02T15:18:37.620Z
Status : Modified
Published: 2023-06-26T22:15:10.097
Modified: 2024-11-21T08:03:31.603
Link: CVE-2023-32523
No data.
OpenCVE Enrichment
No data.
EUVD