{"vulnerability": "CVE-2021-32464", "sightings": [{"uuid": "edd6eaec-1ef3-4ce4-b3f7-7d2fba217e41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32464", "type": "exploited", "source": "https://t.me/cKure/6595", "content": "\u25a0\u25a0\u25a1\u25a1\u25a1 Security firms Trend Micro is warning its customers of attacks exploiting zero-day vulnerabilities in its Apex One and Apex One as a Service products.\n\nThe security firm also reported that attackers already exploited at least two of the flaws (CVE-2021-32464, CVE-2021-32465, CVE-2021-36741, CVE-2021-36742) in attacks in the wild.", "creation_timestamp": "2021-08-13T05:19:44.000000Z"}, {"uuid": "7634bf0a-b152-4c90-b9da-57963012d9ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32464", "type": "seen", "source": "https://t.me/cibsecurity/26853", "content": "\u203c CVE-2021-32464 \u203c\n\nAn incorrect permission assignment privilege escalation vulnerability in Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security Services could allow an attacker to modify a specific script before it is executed. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-04T23:23:49.000000Z"}]}