Show filters
493 Total Results
Displaying 71-80 of 493
Sort by:
Attacker Value
Unknown

CVE-2023-32534

Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers. This is similar to, but not identical to CVE-2023-32531 through 32535.
Attacker Value
Unknown

CVE-2023-32533

Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers. This is similar to, but not identical to CVE-2023-32531 through 32535.
Attacker Value
Unknown

CVE-2023-32532

Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers. This is similar to, but not identical to CVE-2023-32531 through 32535.
Attacker Value
Unknown

CVE-2023-32531

Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Certain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers. This is similar to, but not identical to CVE-2023-32532 through 32535.
Attacker Value
Unknown

CVE-2023-32530

Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Vulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution. Please note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities. This is similar to, but not identical to CVE-2023-32529.
Attacker Value
Unknown

CVE-2023-32529

Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Vulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution. Please note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities. This is similar to, but not identical to CVE-2023-32530.
Attacker Value
Unknown

CVE-2023-32528

Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable .php files that could allow a remote attacker to execute arbitrary code on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32527.
Attacker Value
Unknown

CVE-2023-32527

Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains vulnerable .php files that could allow a remote attacker to execute arbitrary code on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32528.
Attacker Value
Unknown

CVE-2023-32526

Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote attacker to create arbitrary files on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32525.
Attacker Value
Unknown

CVE-2023-32525

Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Trend Micro Mobile Security (Enterprise) 9.8 SP5 contains widget vulnerabilities that could allow a remote attacker to create arbitrary files on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This is similar to, but not identical to CVE-2023-32526.