Page 7 of 44986 results (0.120 seconds)

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

08 Apr 2025 — A local code execution vulnerability exists in the Rockwell Automation Arena® due to an uninitialized pointer. ... If exploited a threat actor can disclose information and execute arbitrary code on the system. ... A local code execution vulnerability exists in the Rockwell Automation Arena® due to an uninitialized pointer. ... If exploited a threat actor can disclose information and execute arbitrary code on the system. • https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html • CWE-457: Use of Uninitialized Variable •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

08 Apr 2025 — A local code execution vulnerability exists in the Rockwell Automation Arena® due to an uninitialized pointer. ... If exploited a threat actor can disclose information and execute arbitrary code on the system. ... A local code execution vulnerability exists in the Rockwell Automation Arena® due to an uninitialized pointer. ... If exploited a threat actor can disclose information and execute arbitrary code on the system. • https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html • CWE-457: Use of Uninitialized Variable •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

08 Apr 2025 — A local code execution vulnerability exists in the Rockwell Automation Arena® due to an uninitialized pointer. ... If exploited a threat actor can disclose information and execute arbitrary code on the system. ... A local code execution vulnerability exists in the Rockwell Automation Arena® due to an uninitialized pointer. ... If exploited a threat actor can disclose information and execute arbitrary code on the system. • https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1726.html • CWE-457: Use of Uninitialized Variable •

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 0

08 Apr 2025 — SQL injection in Ivanti Endpoint Manager before version 2024 SU1 or before version 2022 SU7 allows a remote authenticated attacker with admin privileges to achieve code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Endpoint Manager. ... An attacker can leverage this vulnerability to execute code in the context of the service account. • https://forums.ivanti.com/s/article/Security-Advisory-EPM-April-2025-for-EPM-2024-and-EPM-2022-SU6 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.7EPSS: 0%CPEs: -EXPL: 0

08 Apr 2025 — This could allow an attacker to execute arbitrary code with administrative privileges by placing a malicious executable in the same directory. • https://cert-portal.siemens.com/productcert/html/ssa-525431.html • CWE-269: Improper Privilege Management •

CVSS: 9.4EPSS: 0%CPEs: 1EXPL: 0

08 Apr 2025 — This could allow an authenticated remote attacker to execute arbitrary code with root privileges. • https://cert-portal.siemens.com/productcert/html/ssa-187636.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.4EPSS: 0%CPEs: 1EXPL: 0

08 Apr 2025 — This could allow an authenticated remote attacker to execute arbitrary code with root privileges. • https://cert-portal.siemens.com/productcert/html/ssa-187636.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.4EPSS: 0%CPEs: 1EXPL: 0

08 Apr 2025 — This could allow an authenticated remote attacker to execute arbitrary code with root privileges. • https://cert-portal.siemens.com/productcert/html/ssa-187636.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

07 Apr 2025 — This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins on the affected site's server which may make remote code execution possible. • https://packetstorm.news/files/id/190362 • CWE-862: Missing Authorization •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

07 Apr 2025 — After analyzing the configuration files, we observed that the server had set the TypeFilterLevel to Full which is dangerous as it can potentially lead to remote code execution using deserialization. • https://www.cve.org/CVERecord?id=CVE-2025-3425 • CWE-502: Deserialization of Untrusted Data •