Keyword: apache log4j remote code execution vulnerability cve-2021-44228
103102 Total Search   |   Showing Results : 1001 - 1020
CVE-2013-3889,CVE-2013-3895 This security update resolves two privately reported vulnerabilities in Microsoft Office server software. The most severe vulnerability could allow remote code execution
file with one of the affected software. This threat would not allow remote code execution or elevation of user right, however, it could acquire information that could be used in future attacks Microsoft
of these vulnerabilities could allow remote code execution if a user visits an affected website using a specially crafted URL. However, an attacker would have no way to force users to visit such a
CVE-2010-3970 There is a vulnerability found in Windows Graphics Rendering Engine that may lead to execution of arbitrary code once successfully exploited by a malicious remote user. It may also
CVE-2010-2729 This security update addresses a vulnerability in the Print Spooler service. Once successfully exploited, this could result to remote code execution when an attacker sends a specially
advantage of the following software vulnerabilities to download possibly malicious files: CVE-2013-2423: Java Applet Reflection Type Confusion Remote Code Execution Vulnerability CVE-2012-1723: Java Applet
CVE-2010-0824,MS10-038 Unspecified vulnerability in Microsoft Office Excel 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via an Excel file with a malformed WOPT
Trojan does not have any backdoor routine. Other Details This Trojan is a zero-day exploit for the following vulnerability: (MS13-022) Vulnerability in Silverlight Could Allow Remote Code Execution
CVE-2012-2523 This bulletin resolves a remote code execution vulnerability found in the scripting engines JScript and VBScript in Windows 64-bit systems. The vulnerability exists in the way the said
CVE-2011-0041 �This security update resolves a privately reported vulnerability in Microsoft Windows GDI . The vulnerability could allow remote code execution if a user viewed a specially crafted
CVE-2011-3397 This security update resolves a privately reported vulnerability in Microsoft software. The vulnerability could allow remote code execution if a user views a specially crafted Web page
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka
2014-1762,MS14-035 Unspecified vulnerability in Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code with medium-integrity privileges and bypass a sandbox protection
Could Allow Remote Code Execution (MS09-050) Vulnerabilities in SMBv2 Could Allow Remote Code Execution (MS10-061) Vulnerability in Print Spooler Service Could Allow Remote Code Execution It uses the
CVE-2007-5659 Adobe Acrobat and Reader Collab 'getIcon()' JavaScript Method Remote Code Execution Vulnerability (CVE-2009-0927) After successfully exploiting the said vulnerability, this malware connects to the
(XBAPs), this could allow remote code execution. Moreover, it could also allow remte code execution on a server system running IIS when an attacker uploads a specially crafted ASP.NET page to that server
PHP remote file inclusion vulnerability in ZeroBoard 4.1pl4 and earlier allows remote attackers to execute arbitrary PHP code by modifying the (1) _zb_path parameter to outlogin.php or (2) dir
CVE-2016-1747 This vulnerability affects IOGraphics in Apple OS X before 10.11.4. When exploited successfully via a crafted app, it allows remote attackers to execute arbitrary code or causes denial
Proof-of-Concept (PoC) code for exploiting MS12-020. While the said Remote Desktop Protocol vulnerability could allow remote access to target machines, this PoC is only designed to perform denial of service (DoS) to
This is the Trend Micro detection for malicious network packets that may manifest any of the following actions: Reading of arbitrary files on the remote system More information on the vulnerability