Keyword: apache log4j remote code execution vulnerability cve-2021-44228
103102 Total Search   |   Showing Results : 601 - 620
attackers to execute arbitrary code via a crafted SAMI file. Apply associated Trend Micro DPI Rules. 1001249| 1001249 - Microsoft DirectX Parsing SAMI File Code Execution Vulnerability
Description Name: CVE-2021-44228 - OGNL EXPLOIT - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of networ...
Symantec Web Gateway 5.0.2.8 - Remote Code Execution D-Link Devices - UPnP SOAP Command Execution Linksys E-series - Remote Code Execution AVTECH IP Camera / NVR / DVR Devices - Multiple Vulnerabilities
CVE-2010-3148 This bulletin addresses a publicly disclosed vulnerability in Microsoft Visio , which could lead to arbitrary code execution if a remote user opens a legitimate Visio file located in
A remote code execution vulnerability exists in Microsoft Windows when the Windows graphic component library fails to handle specially crafted embedded image file. An attacker who successfully
CVE-2015-0032 This security update resolves a remote code execution vulnerability present in the scripting engine VBScript 5.6, 5.7, and 5.8. Attackers wanting to exploit this vulnerability may set
CentOS Web Panel 1011657* - CentOS Web Panel Remote Code Execution Vulnerability (CVE-2022-44877) SAP NetWeaver Java Application Server 1011664 - SAP NetWeaver Unrestricted File Upload Vulnerability
Cross-site scripting (XSS) vulnerability in SendMailServlet in the examples web application (examples/jsp/mail/sendmail.jsp) in Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.36 allows
CVE-2007-3383 Cross-site scripting (XSS) vulnerability in SendMailServlet in the examples web application (examples/jsp/mail/sendmail.jsp) in Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through
in Trend Micro Deep Security protects user systems from threats that may leverage this vulnerability with the following DPI rule: 1006111 - Adobe Flash Player Remote Code Execution Vulnerability
* indicates a new version of an existing rule Deep Packet Inspection Rules: Remote Desktop Protocol Server 1009749 - Microsoft Windows Remote Desktop Services�Remote Code Execution Vulnerability
XSLTResult in Apache Struts 2.x before 2.3.20.2, 2.3.24.x before 2.3.24.2, and 2.3.28.x before 2.3.28.1 allows remote attackers to execute arbitrary code via the stylesheet location parameter. Apply
OS X,Adobe Flash Player 13.0.0.277 and earlier on Windows and OS X Apply associated Trend Micro DPI Rules. 1006636| 1006636 - Adobe Flash Player Remote Code Execution Vulnerability (CVE-2015-0349)
CVE-2012-1894 This update resolves a vulnerability identified in MS Office for Mac that could allow remote code execution when successfully exploited. The vulnerability exists in folder permissions
- Apache Superset Improper Input Validation Vulnerability (CVE-2023-39265) 1011906 - XWiki Change Request Extension Code Injection Vulnerability (CVE-2023-45138) 1011904 - XWiki Cross-Site Scripting
- Apache Superset Improper Input Validation Vulnerability (CVE-2023-39265) 1011906 - XWiki Change Request Extension Code Injection Vulnerability (CVE-2023-45138) 1011904 - XWiki Cross-Site Scripting
CVE-2013-1347 This security update patches one vulnerability in Internet Explorer. The vulnerability may allow remote code execution if a user views a maliciously crafted webpage using Internet
An integer overflow vulnerability exists in PHP. The vulnerability is due to an error in reading zip files, causing a heap buffer overflow. A remote attacker can exploit the vulnerability by sending
(CVE-2023-42000) 1011970 - Arcserve Unified Data Protection Remote Code Execution Vulnerability (CVE-2023-41998) DCERPC Services - Client 1011950* - Microsoft Windows SmartScreen Security Feature Bypass
(CVE-2023-42000) 1011970 - Arcserve Unified Data Protection Remote Code Execution Vulnerability (CVE-2023-41998) DCERPC Services - Client 1011950* - Microsoft Windows SmartScreen Security Feature Bypass