Keyword: apache log4j remote code execution vulnerability cve-2021-44228
103106 Total Search   |   Showing Results : 1861 - 1880
and SP2; and Microsoft Office SharePoint Server 2007 SP1 and SP2 allows remote attackers to execute arbitrary code via an Excel file with a Shared String Table (SST) record with a numeric field that
arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than
CVE-2009-2798 Heap-based buffer overflow in Apple QuickTime before 7.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted FlashPix
CVE-2009-0353 Unspecified vulnerability in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to cause a denial of service (memory
CVE-2010-3622 Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via
Trend Micro DPI Rules. 1001304| 1001304 - Microsoft Windows Server First Class Mailslot Message Remote Code Execution
Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258) It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
following software vulnerabilities to drop malicious files: (MS12-027) Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2664258) Other Details This Trojan opens the following files:
malicious files: CVE-2017-0199 | Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows It saves the files it downloads using the following names: %Temporary Internet Files%\Content.IE5
CVE-2011-1991 This security update fixes a disclosed vulnerability in Windows , which could allow arbitrary code execution if users open legitimate .RTF, .TXT, or .DOC files located in the same
were recently exploited in the wild. execCommand Use After Free Vulnerability or CVE-2012-4969 is the most severe of these vulnerabilities which leads to executing malicious code by remote attackers.This
and/or IDF rules. 1003257| 1003257 - Web On Windows ActiveX Control Remote Code Execution
the filter number and filter name when applying appropriate DPI and/or IDF rules. 1000995| 1000995 - Microsoft Word RTF Documents Parsing Remote Code Execution
CVE-2012-1527,CVE-2012-1528 This patch addresses vulnerabilities in Microsoft Windows, which could allow remote code execution via a specially crafted briefcase in Windows Explorer. When exploited,
unknowingly by users when visiting malicious sites. Backdoor Routine This Trojan executes the following commands from a remote malicious user: Arbitrary code execution It connects to the following websites to
arrives via the following means: Microsoft Windows SMB Server (MS17-010) Vulnerability Autostart Technique This Worm registers itself as a system service to ensure its automatic execution at every system
arrives via the following means: Microsoft Windows SMB Server (MS17-010) Vulnerability Autostart Technique This Worm registers itself as a system service to ensure its automatic execution at every system
arrives via the following means: Microsoft Windows SMB Server (MS17-010) Vulnerability Autostart Technique This Worm registers itself as a system service to ensure its automatic execution at every system
arrives via the following means: Microsoft Windows SMB Server (MS17-010) Vulnerability Autostart Technique This Worm registers itself as a system service to ensure its automatic execution at every system
arrives via the following means: Microsoft Windows SMB Server (MS17-010) Vulnerability Autostart Technique This Worm registers itself as a system service to ensure its automatic execution at every system