Keyword: apache log4j remote code execution vulnerability cve-2021-44228
102986 Total Search   |   Showing Results : 441 - 460
A remote code execution vulnerability exists in Microsoft Windows OLE when Microsoft Word improperly handles specially crafted word document. An attacker who successfully exploited this vulnerability
A remote code execution vulnerability exists in Microsoft Silverlight when a specially crafted Silverlight application is opened in Silverlight Runtime. An attacker who successfully exploited this
download files: Stack-based buffer overflow in CoolType.dll in certain versions of Adobe Reader and Acrobat Adobe Reader and Acrobat 'newplayer()' JavaScript Method Remote Code Execution Vulnerability Other
A remote code execution vulnerability has been reported in MySQL database server. An authenticated remote user can send a specially crafted request to execute arbitrary code with root privileges on
6, 7, 8, and 9. The most severe of the vulnerabilities was found able to allow arbitrary code execution when exploited. This same vulnerability was earlier reported to have been used in targeted
for Microsoft Video Control (3199151) Risk Rating: Critical This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution when Microsoft Video
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. This vulnerability could corrupt memory in such a way that an attacker could execute
CVE-2004-0493 The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote attackers to cause a denial of service (memory exhaustion), and possibly an integer signedness error leading
A remote code execution vulnerability exists in Internet Explorer scripting engine when it improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an
A remote code execution vulnerability exists when Windows fails to validate the authenticity of a module before loading it in run-time. An attacker who successfully exploited the vulnerability could
A remote code execution vulnerability exists when Windows fails to validate the authenticity of a module before loading it in run-time. An attacker who successfully exploited the vulnerability could
A remote code execution vulnerability exists in Internet Explorer scripting engine when it improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an
A remote code execution vulnerability exists in Internet Explorer scripting engine when it improperly accesses an object in memory. This vulnerability may corrupt memory in such a way that an
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory that have been deleted. This vulnerability could corrupt memory in such a way that an
Drupal Coder module prone to a remote code execution vulnerability. The vulnerability is due to improper input validation on user-supplied input. A remote, unauthenticated attacker could exploit this
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. This vulnerability could corrupt memory in such a way that an attacker could execute
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. This vulnerability could corrupt memory in such a way that an attacker could execute
Redis Integer Overflow Vulnerability (CVE-2022-35951) Web Server Common 1011562 - Disallow Upload Of DLL File 1011553* - IBM WebSphere Application Server Remote Code Execution Vulnerability (CVE-2020-4464
A remote code execution vulnerability exists when Microsoft Office fails to validate the authenticity of a module before loading it at run-time. An attacker who successfully exploited the
10,oracle opensolaris 8,oracle opensolaris 9 Apply associated Trend Micro DPI Rules. 1004367| 1004367 - Multiple Vendor ToolTalk Heap Overflow Remote Code Execution Vulnerability