Page 4 of 57022 results (0.120 seconds)

CVSS: 7.3EPSS: 0%CPEs: 2EXPL: 0

25 Mar 2025 — A vulnerability in the Trend Micro Apex One Security Agent Plug-in User Interface Manager could allow a local attacker to bypass existing security and execute arbitrary code on affected installations. ... Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. • https://success.trendmicro.com/en-US/solution/KA-0018217 • CWE-286: Incorrect User Management •

CVSS: 7.3EPSS: 0%CPEs: 2EXPL: 0

25 Mar 2025 — A vulnerability in the Trend Micro Apex One Security Agent Plug-in User Interface Manager could allow a local attacker to bypass existing security and execute arbitrary code on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. • https://success.trendmicro.com/en-US/solution/KA-0018217 • CWE-269: Improper Privilege Management •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

25 Mar 2025 — Prior to versions 14.91.0 and 15.52.0, a system user was able to create certain documents in a specific way that could lead to remote code execution. • https://github.com/frappe/frappe/security/advisories/GHSA-v342-4xr9-x3q3 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: -EXPL: 0

25 Mar 2025 — This vulnerability allows remote attackers to execute arbitrary code on affected installations of BEC Technologies Multiple Routers. ... The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the device. •

CVSS: 8.8EPSS: 0%CPEs: -EXPL: 0

25 Mar 2025 — This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. ... The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code in the context of root. •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

25 Mar 2025 — An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of OpenSSL. ... An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. •

CVSS: 8.8EPSS: 0%CPEs: -EXPL: 0

25 Mar 2025 — An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the root. •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

25 Mar 2025 — An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of OpenSSL. ... An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. •

CVSS: 8.0EPSS: 0%CPEs: -EXPL: 0

25 Mar 2025 — This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of CarlinKit CPC200-CCPA devices. ... An attacker can leverage this vulnerability to execute code in the context of root. •

CVSS: 7.8EPSS: 0%CPEs: -EXPL: 0

25 Mar 2025 — An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of the application system-on-chip (SoC). ... An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the boot process. •