[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-34926":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-22T16:08:08.064Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":26,"aliases":27,"duplicate_of":9,"upstream":28,"downstream":29,"duplicates":30,"related":31,"reserved_at":9,"published_at":32,"modified_at":33,"state":34,"summary":35,"references_raw":46,"kevs":69,"epss":80,"epss_history":83,"metrics":85,"affected":93},"CVE-2026-34926","A directory traversal vulnerability in the Apex One (on-premise) server could allow a pre-authenticated local attacker to modify a key table on the server to inject malicious code to deploy to agents on affected installations.\n\n\r\nThis vulnerability is only exploitable on the on-premise version of Apex One and a potential attacker must have access to the Apex One Server and already obtained administrative credentials to the server via some other method to exploit this vulnerability.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":9,"capec":18},"CWE-23","Relative Path Traversal","The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as \"..\" that can resolve to a location that is outside of that directory.","weakness","Draft","Base",[19,22],{"id":20,"name":13,"techniques":21},"CAPEC-139",[],{"id":23,"name":24,"techniques":25},"CAPEC-76","Manipulating Web Input to File System Calls",[],[],[],[],[],[],[],"2026-05-21T13:03:21.164Z","2026-05-22T12:47:07.213Z","Undergoing Analysis",{"cisa_kev":36,"cisa_ransomware":37,"cisa_vendor":38,"epss_severity":39,"epss_score":40,"severity":41,"severity_score":42,"severity_version":43,"severity_source":44,"severity_vector":45,"severity_status":34},true,false,"Trend Micro","low",0.00253,"medium",6.7,"v3.1","cve.org","CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L",[47,52,56,60,64],{"url":48,"sources":49,"tags":51},"https://success.trendmicro.com/en-US/solution/KA-0023430",[44,50],"nvd",[],{"url":53,"sources":54,"tags":55},"https://success.trendmicro.com/ja-JP/solution/KA-0022974",[44,50],[],{"url":57,"sources":58,"tags":59},"https://jvn.jp/en/vu/JVNVU90583059/",[44,50],[],{"url":61,"sources":62,"tags":63},"https://www.jpcert.or.jp/english/at/2026/at260014.html",[44,50],[],{"url":65,"sources":66,"tags":67},"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-34926",[44,50],[68],"Government Resource",[70],{"source":71,"vendor":38,"product":72,"date_added":73,"vulnerability_name":74,"short_description":75,"required_action":76,"due_date":77,"known_ransomware_campaign_use":78,"notes":79,"exploitation_type":9},"cisa","Apex One","2026-05-21","Trend Micro Apex One (On-Premise) Directory Traversal Vulnerability","Trend Micro Apex One (on-premise) contains a directory traversal vulnerability that could allow a pre-authenticated local attacker to modify a key table on the server to inject malicious code to deploy to agents on affected installations.","Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","2026-06-04","Unknown","https://success.trendmicro.com/en-US/solution/KA-0023430 ; https://nvd.nist.gov/vuln/detail/CVE-2026-34926",{"date":81,"score":40,"percentile":82},"2026-05-22",0.48695,[84],{"date":81,"score":40,"percentile":82},[86,91],{"source":44,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":87,"cvss_v4_0":9},{"baseScore":42,"baseSeverity":88,"vectorString":45,"impactScore":89,"exploitabilityScore":90},"MEDIUM",8.8,2.1,{"source":50,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":92,"cvss_v4_0":9},{"baseScore":42,"baseSeverity":88,"vectorString":45,"impactScore":89,"exploitabilityScore":90},[94,106],{"ecosystem":9,"name":95,"vendor":96,"product":97,"cpe_part":98,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":99},"TrendAI Apex One","trend micro, inc.","trendai apex one","a",[100],{"version":101,"is_range":36,"range_type":44,"version_start":102,"version_start_type":103,"version_end":104,"version_end_type":105,"fixed_in":9},">= 2019 (14.0), \u003C 14.0.0.17079","2019 (14.0)","including","14.0.0.17079","excluding",{"ecosystem":9,"name":107,"vendor":96,"product":108,"cpe_part":98,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":109},"TrendAI Apex One as a Service","trendai apex one as a service",[110],{"version":111,"is_range":36,"range_type":44,"version_start":112,"version_start_type":103,"version_end":113,"version_end_type":105,"fixed_in":9},">= SaaS, \u003C 14.0.20731","SaaS","14.0.20731"]