Keyword: apache log4j remote code execution vulnerability cve-2021-44228
103217 Total Search   |   Showing Results : 2241 - 2260
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Adobe Acrobat and Reader are prone to an unspecified use after free vulnerability. Attackers can exploit the vulnerability to do code corruption, control-flow hijack, or information leak attack.
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and before 11.2.202.521 on Linux allows attackers to execute arbitrary code via unspecified
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and before 11.2.202.521 on Linux allows attackers to execute arbitrary code via unspecified
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and before 11.2.202.521 on Linux allows attackers to execute arbitrary code via unspecified
certificate to bypass certain checks. Successful exploitation could allow a remote attacker to bypass intended access restrictions. OpenSSL 1.0.2c,OpenSSL 1.0.2b,OpenSSL 1.0.1n,OpenSSL 1.0.1o Vulnerability
* indicates a new version of an existing rule Deep Packet Inspection Rules: Ivanti Avalanche Remote Control Server 1011719 - Ivanti Avalanche Authentication Bypass Vulnerability (CVE-2022-44574)
Adobe Flash Player contains a vulnerability in the ActionScript 3 ByteArray class, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Ref:
This Trojan may be downloaded from remote sites by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It
CVE-2015-5119 Adobe Flash Player contains a vulnerability in the ActionScript 3 ByteArray class, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
This Trojan takes advantage of a vulnerability in Java Runtime Environment (JRE) component to allow a remote user execute an arbitrary code, thus, compromising system's security. This Trojan arrives
It may be downloaded by other malware/grayware/spyware from remote sites. It arrives as an attachment to email messages spammed by other malware/grayware/spyware or malicious users. Arrival Details
vulnerability in a certain software to allow a remote malicious user or malware to download files on the affected machine. Arrival Details This Trojan may be hosted on a website and run when a user accesses the
CVE-2010-2482 LibTIFF 3.9.4 and earlier does not properly handle an invalid td_stripbytecount field, which allows remote attackers to cause a denial of service (NULL pointer dereference and
2013-2423 Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown