Keyword: apache log4j remote code execution vulnerability cve-2021-44228
103106 Total Search   |   Showing Results : 2001 - 2020
There is an unknown Java unserialization vulnerability in third-party Java libraries that could be used to remotely exploit Java based web applications. Serialization is a process in which an object
vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to produce information that could be used to try to further compromise an affected system.
vulnerabilities to allow a remote user or malware/grayware to download files: Vulnerability in the Adobe Acrobat and Reader Doc.media.newPlayer method Other Details More information on this vulnerability can be
Updates List Process Inject code to process Download and execute files Download configuration Perform remote shell Start VNC NOTES: This backdoor has the capability to setup a virtual network computing (VNC
| 1000363 - IBM Lotus Domino JavaScript Execution Vulnerability In Subject Header
This Trojan arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. It takes advantage of an unknown vulnerability in a certain software to allow a remote
DPI Rules. 1003719| 1003719 - Mozilla Firefox Multiplatform Remote Code Execution Via pkcs11 Module
This Trojan takes advantage of a vulnerability in Java Runtime Environment (JRE) component to allow a remote user execute an arbitrary code, thus, compromising the system's security. This Trojan
Intel Common Base Agent Remote Command Execution Vulnerability
It sends the stolen information to a specific port via injected code in IEXPLORE.EXE. After a successful connection to the server, it then waits for a command from the server. The commands received
vulnerabilities to allow a remote user or malware/grayware to download files: Use-after-free vulnerability in the Doc.media.newPlayer method in Adobe Reader and Acrobat Other Details More information on this
DGN1000 1.1.00.48 - 'Setup.cgi' Remote Code Execution MVPower DVR It uses the following credentials to try to login to other devices: password 12345 user pass admin1234 1111 guest smcadmin 666666 klv123
This security update addresses a privately reported vulnerability in Microsoft Windows. Once successfully exploited, this vulnerability could allow elevation of privilege if an attacker convinces a
A Cross Site Scripting vulnerability has been found in the Events Made Easy WordPress plugin. By using this issue an attacker can create a specially crafted event which, when posted to WordPress,
information from the affected system: Native System Information NOTES: It can send and receive backdoor commands from a remote server: Update the dll binary file Receive and execute arbitrary code Update C&C
This backdoor may arrive bundled with malware packages as a malware component. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This
Driver Could Allow Remote Code Execution (3000061) (MS15-051) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057191) (MS15-077) Vulnerability in ATM Font Driver Could
used by the Microsoft Antimalware Client. An attacker who successfully exploits this vulnerability could execute arbitrary code and take complete control of an affected system. The attacker could then
to a browser using Team Foundation Server web access. Attackers looking to exploit this vulnerability may set up a page where it hosts the exploit code and entice users to click on a link that
the following vulnerabilities to remotely execute commands on exploited devices: CCTV-DVR RCE CVE-2018-7600 CVE-2015-1427 ThinkPHP 5x - Remote Code Execution CVE-2014-3120 CVE-2016-10639 CVE-2018-1273