Keyword: apache log4j remote code execution vulnerability cve-2021-44228
103217 Total Search   |   Showing Results : 2261 - 2280
RedHat JBoss application server is prone to a remote information disclosure vulnerability. The vulnerability gets exploited by sending malformed HTTP request to the vulnerable software. A successful
SQL injection vulnerability exists in WP-Slimstat plugin. The vulnerability could allow a remote user to perform blind SQL injection attacks potentially allowing them access to database content and a
CVE-2008-5448 Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.2.0.2 allows remote attackers to affect confidentiality, integrity, and availability via
http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Macintosh. 1003833| 1003833 - Adobe Reader And Acrobat U3D File Invalid Array Index Remote Vulnerability
CVE-2010-2883 Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code
This malware is downloaded by the zero-day exploit leveraging the vulnerability covered under CVE-2014-4114, also known as "Sandworm." To get a one-glance comprehensive view
following software vulnerabilities to drop malicious files: CVE-2017-8570 | Microsoft Office Remote Code Execution Vulnerability Other Details This Trojan connects to the following possibly malicious URL:
versions of Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. An attacker who successfully exploited
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204 allows attackers to
following commands from a remote malicious user: idl - sleep/idle run - download and execute arbitrary file rem - uninstall itself rdl - update copy of injected code in svchost and add encrypted code to
A policy bypass vulnerability exists in Google Chrome due to improper handling of script tags within svg tags. A remote attacker can exploit this vulnerability by enticing a user to follow a crafted
CVE-2010-2573 This update resolves two vulnerabilities in Microsoft Office that could allow a malicious user to execute code remotely when users open a specially crafted PowerPoint file. The said
(RE: [Noteworthy] Flash 0day(CVE-2016-4117)) According to the report, Separately, Adobe officials warned that a newly discovered Flash vulnerability also gives attackers the ability to remotely
This malware may be hosted on a website and run when a user accesses the said website. It takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware
file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. NOTES: It takes advantage of the following vulnerability to allow an arbitrary code to execute on
A buffer overrun vulnerability was discovered in Microsoft Windows while handling malformed EMF file which will lead to a heap corruption. Successful exploitation of this issue could allow attackers
A vulnerability was discovered in Microsoft Edge when the browser fails to handle certain iframe source URIs that then allows attackers to allow the source to execute JavaScript code on behalf of the
Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and before 11.2.202.451 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type
A vulnerability was discovered in Microsoft Edge when the browser fails to handle certain iframe source URIs that then allows attackers to allow the source to execute JavaScript code on behalf of the
http://t.tr2q.com/x.js http://t.awcna.com/x.js http://t.amynx.com/x.js --> It takes advantage of the following vulnerabilities: CVE-2017-0199 | .RTF Remote Code Execution It adds the following scheduled tasks: Task Name: