Keyword: apache log4j remote code execution vulnerability cve-2021-44228
103106 Total Search   |   Showing Results : 1661 - 1680
Explorer during instantiation, which allows remote attackers to execute arbitrary code via a web site that references multiple ActiveX controls, as demonstrated by the ImexGrid and FieldList controls, aka
and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via unspecified properties in the data in a crafted RTF document,
CVE-2010-1882 Multiple buffer overflows in the MPEG Layer-3 Audio Codec for Microsoft DirectShow in l3codecx.ax in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allow remote attackers to
CVE-2009-2518,MS09-062 Integer overflow in GDI+ in Microsoft Office XP SP3 allows remote attackers to execute arbitrary code via an Office document with a bitmap (aka BMP) image that triggers memory
CVE-2010-0477 The SMB client in Microsoft Windows Server 2008 R2 and Windows 7 does not properly handle (1) SMBv1 and (2) SMBv2 response packets, which allows remote SMB servers and man-in-the-middle
fields in an SMB request, which allows remote attackers to execute arbitrary code via a crafted SMB packet, aka "SMB Pool Overflow Vulnerability." Microsoft Windows XP,Microsoft Windows Vista,Microsoft
* indicates a new version of an existing rule Deep Packet Inspection Rules: Web Application Common 1010134 - rConfig Remote Command Execution Vulnerability (CVE-2019-19509) Integrity Monitoring
It takes advantage of the vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087). Once it successfully exploits the said vulnerability, it drops a file detected as
Technique This Trojan modifies the following registry entries to ensure it automatic execution at every system startup: HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Run ctfmon.exe = %System%
Systems SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted LDAP request with an unspecified number of "convertible attributes." Microsoft windows 2000 Server SP4,Microsoft
Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1004378| 1004378 - Apple Webkit SVG First-Letter Style Remote Code Execution
ASLR bypasses in conjunction with another vulnerability, such as a remote code execution vulnerability, to more reliably run arbitrary code on a target system. Windows Server 2003 x64 Edition Service
Vulnerability in Server Service Could Allow Remote Code Execution (958644) Dropping Routine This worm drops the following files: %System%\lsasvc.exe (Note: %System% is the Windows system folder, which is usually
Apply associated Trend Micro DPI Rules. 1004527| 1004527 - CUPS Server 'cups/ipp.c' Remote Memory Corruption Vulnerability
Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows remote attackers to execute arbitrary code via a malformed
Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as
can be found below: MS04-028 NOTES: It takes advantage of the following vulnerabilities: MS04-028 - Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution
There exists a buffer overflow in Media Digital Rights Management ActiveX control, this could lead to remote code execution and hence system compromise. Microsoft Internet Explorer Apply associated
Oracle Java SE 7 Update 6 and earlier which allow remote attackers to execute arbitrary code through a specially crafted applet that bypasses SecurityManager restrictions. Exploit:Java/CVE-2012-4681.AL
vulnerabilities in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allow remote attackers to execute arbitrary code by instantiating certain COM objects from Wmm2fxa.dll as ActiveX controls including (1)