Keyword: apache log4j remote code execution vulnerability cve-2021-44228
103106 Total Search   |   Showing Results : 1781 - 1800
It opens a hidden instance of svchost.exe and injects codes in it. Once it has passed its code of execution to svchost.exe , it sleeps for 1000 milliseconds and delete its physical copy to prevent
CVE-2010-3147 This security update resolves a vulnerability in Windows Address Book, which could allow a remote user to execute code on the affected system. The exploit works if a user opens a
exploited, a remote attacker could execute code on the vulnerable system. Microsoft Office 2003 Service Pack 3,Microsoft Office 2003 Web Components Service Pack 3,Microsoft Office 2007 Service Pack 2,Microsoft
CVE-2012-0173 A vulnerability in the Remote Desktop Protocol (RDP) exists in the way that it accesses an object in memory that changed or is deleted. When successfully exploited, an attacker could
This security update addresses a vulnerability found existing in Microsoft Windows. Once this vulnerability is successfully exploited, it could allow elevation of privilege when a remote attacker
CVE-2012-1895,CVE-2012-1896,CVE-2012-2519,CVE-2012-4776,CVE-2012-4777 This patch addresses vulnerabilities existing in the .NET Framework. It could allow remote code execution once a remote attacker
Samba 3.0.8,Samba Samba 3.0.9 Apply associated Trend Micro DPI Rules. 1003999| 1003999 - Samba MS-RPC Remote Shell Command Execution Vulnerability
to execute arbitrary code by sending packets to a listening service, and thereby triggering misinterpretation of an unspecified field as a function pointer, aka "TCP/IP Timestamps Code Execution
CVE-2008-1328 Buffer overflow in the LGServer service in CA ARCserve Backup for Laptops and Desktops r11.0 through r11.5, and Suite 11.1 and 11.2, allows remote attackers to execute arbitrary code
1000761| 1000761 - IPSwitch IMail Server SMTP Service Unspecified Code Execution
is Trend Micro's detection for Trojanized Android applications. While the legitimate software runs, it silently executes malicious code in the background. Upon execution of the affected application,
arrives via the following means: Microsoft Windows SMB Server (MS17-010) Vulnerability Autostart Technique This Worm registers itself as a system service to ensure its automatic execution at every system
Apply associated Trend Micro DPI Rules. 1004565| 1004565 - Microsoft Data Access Object Recordset Remote Code Execution
this worm creates. This worm propagates in two ways from which they are achieved by taking advantage of a vulnerability discovered in certain Microsoft operating systems that could allow remote code
projects. The MIRAI variant named Mukashi attacks network-attached storage (NAS) devices. Mukashi takes advantage of CVE-2020-9054, a vulnerability found in Zyxel NAS devices. Exploitation allows remote
Vulnerability in Windows Common Controls Could Allow Remote Code Execution It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system. NOTES: Upon
This Trojan takes advantage of unknown vulnerabilities in the following software to download malicious files: Microsoft Internet Explorer Invalid Pointer Reference Remote Code Execution After
and 10(64-bit).) Dropping Routine This Trojan takes advantage of the following software vulnerabilities to drop malicious files: (MS14-060) Vulnerability in Windows OLE Could Allow Remote Code Execution
Description Name: CVE-2016-3081 - Remote Code Execution - HTTP (Request) . This is the Trend Micro detection for malicious HTTP network packet
downloaded unknowingly by users when visiting malicious sites. Backdoor Routine This backdoor executes the following commands from a remote malicious user: Download and Upload Files Remote Code Execution It