Keyword: apache log4j remote code execution vulnerability cve-2021-44228
103106 Total Search   |   Showing Results : 1981 - 2000
2013-4826 Unspecified vulnerability in HP Intelligent Management Center (iMC) and HP IMC Service Operation Management Software Module allows remote attackers to obtain sensitive information via
A Cross Site Scripting (XSS) vulnerability has been found in the Huge-IT Joomla Extension. By using this vulnerability an attacker can inject malicious JavaScript code into the application, which
CVE-2015-5867 This vulnerability exists in Apple iOS before 9 that can allow attackers to execute arbitrary code or cause denial of service (DoS) via a crafted application, thus compromising the
vulnerabilities to allow a remote user or malware/grayware to download files: Vulnerability in the Adobe Acrobat and Reader Doc.media.newPlayer method Other Details More information on this vulnerability can be
2012-5076 Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and
commands using elevated privileges on vulnerable systems It takes advantage of the following vulnerabilities: (MS14-058) Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution (3000061)
Description Name: CVE-2019-6340 Drupal 8 RESTful Web Services Remote Code Execution - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of ...
Description Name: CVE-2016-6662 - MySQL Remote Code Execution Exploit . This is Trend Micro detection for MYSQL network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of...
Description Name: Possible WINBOX Remote Code Execution - TCP . This is Trend Micro detection for TCP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network b...
CVE-2011-3396 This security update resolves two privately reported vulnerabilities in Microsoft Office . The vulnerabilities could allow remote code execution if a user opens a specially crafted
Description Name: OGNL REMOTE CODE EXECUTION EXPLOIT - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of n...
http://{BLOCKED}i.com/e32c8df2cf6b7a16/specify.html Other Details This Trojan takes advantage of the following vulnerabilities: CVE-2021-40444 HEUR:Exploit.MSOffice.Agent.gen (KASPERSKY) Remote Code
that could lead to unsecured library loading behavior. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated system privileges. Apply associated Trend Micro DPI
A reflected Cross Site Scripting (XSS) vulnerability has been found in the Huge-IT Video Gallery Joomla Extension. By using this vulnerability an attacker can inject malicious JavaScript code into
An elevation of privilege vulnerability exists when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run
An elevation of privilege vulnerability exists when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run
An elevation of privilege vulnerability exists when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run
An elevation of privilege vulnerability exist in the way that Windows kernel-mode drivers handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code
A reflected Cross Site Scripting (XSS) vulnerability has been found in the Contact Form to Email WordPress Plugin. By using this vulnerability an attacker can inject malicious JavaScript code into
CVE-2015-6616 This vulnerability resides in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01. It allows attackers to execute arbitrary code or cause denial of service (DoS), thus compromising