Keyword: apache log4j remote code execution vulnerability cve-2021-44228
103217 Total Search   |   Showing Results : 2201 - 2220
This is a component of a malicious Java archive file (.JAR). When executed, it may connect to remote sites to download possibly malicious files. However, it requires other components in order to run
CVE-2013-2470 Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK
CVE-2011-1263 This security update resolves a privately reported vulnerability in Remote Desktop Web Access . The vulnerability is a cross-site scripting (XSS) vulnerability that could allow
Donations Plugin Remote Administrative Access Vulnerability (CVE-2019-6703) Web Client Common 1009210* - Adobe Acrobat And Reader Multiple Security Vulnerabilities (APSB18-21) - 4 1009213* - Adobe Acrobat And
Arbitrary code execution Other Details This Others does the following: Performs brute force on port 23 using the following credentials: root aquario root 88 root ding1234 root 5up root 888 guest 123 admin
Execution (CVE-2017-17215) GPON Routers - Authentication Bypass / Command Injection (CVE-2018-10561) ThinkPHP vulnerability It displays the following string once executed in the command line: LuckyGhost
specially crafted DER-encoded input. A remote attacker can exploit this vulnerability in GnuTLS by sending a crafted ASN.1 certificate to a target application. Successful exploitation may result in a
CVE-2011-0977,CVE-2011-0107 This security update addresses two vulnerabilities in Microsoft Office, which could allow remote code execution. A remote malicious user could gain the same user rights as
capabilities on local accounts based on acquired password list Replicates other Remote Desktop Protocol (RDP) utilities’ mutexes to mask execution in the background, then deletes itself after execution Downloads
information itself. Note that this vulnerability would not allow an attacker to execute code or to elevate the attacker's user rights directly, but it could be used to produce information that could be used to
This File infector infects by appending its code to target host files. Installation This File infector adds the following mutexes to ensure that only one of its copies runs at any one time:
Integrity Monitoring Rules in this Security Update. Log Inspection Rules: 1010349* - Docker Daemon Remote API Calls
This Trojan takes advantage of software vulnerabilities to allow a remote user or malware/grayware/spyware to download files. It executes the downloaded files. As a result, malicious routines of the
This Trojan takes advantage of a vulnerability in Java Runtime Environment (JRE) component to allow a remote user execute an arbitrary code, thus, compromising system's security. This Trojan arrives
downloaded unknowingly by users when visiting malicious sites. Other Details This Trojan takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to
CVE-2010-3963 This update resolves a vulnerability in the Routing and Remote Access NDProxy component of Microsoft Windows. An attacker with valid logon credentials could gain elevation of privilege
Download Routine It takes advantage of the following software vulnerabilities to allow a remote user or malware/grayware/spyware to download files: Vulnerability in the Adobe Acrobat and Reader
SQL injection vulnerability exists in Huge-IT Slideshow Extension. The vulnerability could allow a remote user to perform SQL injection attacks potentially allowing them access to database content
Cross-site scripting (XSS) vulnerability in Wordpress Jetpack plugin allows remote attackers to inject arbitrary web script or HTML via crafted content, leading to administrative command execution,
Verifier Cache Remote Code Execution (CVE-2012-1723) It downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by