Keyword: apache log4j remote code execution vulnerability cve-2021-44228
103217 Total Search   |   Showing Results : 2281 - 2300
CVE-2013-0086 This patch addresses a vulnerability existing in Microsoft OneNote. A remote attacker can abused this vulnerability when they lure users into opening a specially crafted OneNote file
CVE-2008-5437 Unspecified vulnerability in the Job Queue component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.6 allows remote authenticated users to affect confidentiality
A denial-of-service vulnerability has been reported in ISC BIND. The vulnerability is due to improperly processing DNS cookies. A remote attacker could exploit this vulnerabilities by sending a
A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker creates multiple RDP sessions that fail to properly free objects in memory. An unauthenticated attacker
CVE-2008-2991 Cross-site scripting (XSS) vulnerability in Adobe RoboHelp Server 6 and 7 allows remote attackers to inject arbitrary web script or HTML via vectors related to the Help Errors log.
unspecified vectors. nvd: Per: http://www.adobe.com/support/security/bulletins/apsb10-02.html , a buffer overflow vulnerability in the Download Manager that could lead to code execution (CVE-2009-3958). adobe
extensions by inserting code in the said files: .EXE .SCR .HTM .HTML Propagation This file infector gathers target email addresses from the Windows Address Book (WAB). It exploits an unknown vulnerability in
downloaded unknowingly by users when visiting malicious sites. This malware arrives via the following means: Microsoft Windows SMB Server (MS17-010) Vulnerability Autostart Technique This Worm registers itself
server. A remote attacker can exploit this vulnerability by enticing a user to request a file over HTTP and sending an HTTP redirect to an FTP location hosting a malicious file intended to overwrite a user
This threat is related to attacks that used Android Same Origin Policy (SOP) vulnerability to target Facebook users. To get a one-glance comprehensive view of the behavior of this Trojan, refer to
MS10-065,CVE-2010-2731 Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.1 on Windows XP SP3, when directory-based Basic Authentication is enabled, allows remote attackers
CVE-2015-2590 Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It is a specially crafted PDF file
CVE-2006-5784 Unspecified vulnerability in enserver.exe in SAP Web Application Server 6.40 before patch 136 and 7.00 before patch 66 allows remote attackers to read arbitrary files via crafted data
JPEG XR (.JXR) image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to
Adobe Flash Player is prone to a type confusion overflow vulnerability. Attackers can exploit the vulnerability by using the out of bounds access for unintended reads, writes or frees – potentially
Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and before 11.2.202.481 on Linux allow attackers to execute arbitrary code by leveraging an unspecified "type
The said vulnerabilities when exploited could allow remote code execution via a specially crafted webpage thus compromising the security of the affected systems. These also affect Internet Explorer
Description Name: EXPLOYT - HTTP (Request) - Variant 5 . EXPLOYT variants may arrive on a system bundled with malware or grayware packages, or hosted on a website and runs when a user accesses said website. EXPLOYT malware takes advantage of certain ...
vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer thus compromising the security of the system. An attacker who successfully exploited these