Show filters
493 Total Results
Displaying 71-80 of 493
Sort by:
Attacker Value
Unknown
CVE-2023-32534
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.
This is similar to, but not identical to CVE-2023-32531 through 32535.
0
Attacker Value
Unknown
CVE-2023-32533
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.
This is similar to, but not identical to CVE-2023-32531 through 32535.
0
Attacker Value
Unknown
CVE-2023-32532
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.
This is similar to, but not identical to CVE-2023-32531 through 32535.
0
Attacker Value
Unknown
CVE-2023-32531
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.
This is similar to, but not identical to CVE-2023-32532 through 32535.
0
Attacker Value
Unknown
CVE-2023-32530
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Vulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution.
Please note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities.
This is similar to, but not identical to CVE-2023-32529.
0
Attacker Value
Unknown
CVE-2023-32529
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Vulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution.
Please note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities.
This is similar to, but not identical to CVE-2023-32530.
0
Attacker Value
Unknown
CVE-2023-32528
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable .php files that could allow a remote attacker to execute arbitrary code on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32527.
0
Attacker Value
Unknown
CVE-2023-32527
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable .php files that could allow a remote attacker to execute arbitrary code on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32528.
0
Attacker Value
Unknown
CVE-2023-32526
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote attacker to create arbitrary files on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32525.
0
Attacker Value
Unknown
CVE-2023-32525
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote attacker to create arbitrary files on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is similar to, but not identical to CVE-2023-32526.
0