Keyword: apache log4j remote code execution vulnerability cve-2021-44228
103106 Total Search   |   Showing Results : 1301 - 1320
CVE-2012-0177,MS12-028 Heap-based buffer overflow in the Office Works File Converter in Microsoft Office 2007 SP2, Works 9, and Works 6-9 File Converter allows remote attackers to execute arbitrary
CVE-2013-2028 The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a
Disclosure Vulnerability (CVE-2018-0760) 1009140* - Microsoft Windows Media Foundation Memory Corruption Vulnerability (CVE-2018-8251) 1009134* - Microsoft Windows Remote Code Execution Vulnerability
office_2003,microsoft office_snapshot_viewer_activex office_xp Apply associated Trend Micro DPI Rules. 1002621| 1002621 - Microsoft Office Snapshot Viewer ActiveX Control Remote Code Execution
CVE-2014-0094,CVE-2014-0112,CVE-2014-0114 The ParametersInterceptor in Apache Struts allows remote attackers to "manipulate" the ClassLoader via the class parameter, which is passed to the getClass
vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1002682| 1002682 - Mozilla Firefox Code Execution Vulnerability
Double free vulnerability in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to execute arbitrary code via "cloned XUL DOM elements
across a network: (MS08-067) Vulnerability in Server Service Could Allow Remote Code Execution (958644) It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the
associated Trend Micro DPI Rules. 1005922| 1005922 - Adobe Flash Player Remote Code Execution Vulnerability (CVE-2014-0502)
Shortcut File Over Network Share 1004302 - Microsoft Windows Shortcut Remote Code Execution For CVE-2013-3918: 1005779 - Microsoft Internet Explorer ActiveX Control Code Execution Vulnerability
Code Execution Vulnerability It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Download Routine This Trojan does not have any
Graphics Component Could Allow Remote Code Execution Exploit:Win32/CVE-2013-3906 (Microsoft); Trojan.Hantiff (Symantec); Exploit-CVE2013-3906 (McAfee) Understanding The Zero-Day Vulnerability in the MS
* indicates a new version of an existing rule Deep Packet Inspection Rules: HP Intelligent Management Center (IMC) 1011941 - Apache OFBiz Insecure Deserialization Vulnerability (CVE-2023-49070)
* indicates a new version of an existing rule Deep Packet Inspection Rules: HP Intelligent Management Center (IMC) 1011941 - Apache OFBiz Insecure Deserialization Vulnerability (CVE-2023-49070)
Remote Code Execution (2664258) It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Spammed via email Drops files
Windows Common Controls Could Allow Remote Code Execution (2664258) It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. Via email
malicious files: (MS12-027) Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258) It executes the dropped file(s). As a result, malicious routines of the dropped files are
(MS12-027) Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258) It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on
Remote Code Execution Other Details More information on this vulnerability can be found below: CVE-2009-3129 Troj/DocDrop-S (Sophos), MSExcel/CVE_2009_3129.A!exploit (Fortinet), Exploit/XLS.gen (FProt),
The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these