Keyword: apache log4j remote code execution vulnerability cve-2021-44228
103106 Total Search   |   Showing Results : 1881 - 1900
malware arrives via the following means: Microsoft Windows SMB Server (MS17-010) Vulnerability Autostart Technique This Ransomware registers itself as a system service to ensure its automatic execution at
arrives via the following means: Microsoft Windows SMB Server (MS17-010) Vulnerability Autostart Technique This Worm registers itself as a system service to ensure its automatic execution at every system
arrives via the following means: Microsoft Windows SMB Server (MS17-010) Vulnerability Autostart Technique This Worm registers itself as a system service to ensure its automatic execution at every system
This spyware targets mobile banking users by posing as a fake token generator. During execution it asks for the user's password and generates a fake token while sending the user's information to a
and Remote Access service (RRAS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote unauthenticated or authenticated attackers to execute arbitrary code via
exploits the said vulnerability, it causes the following actions to be done on the system: Execute arbitrary code on the affected machine such as execution of other malware. It is a zero-day exploit for the
vulnerabilities in �Microsoft Office that could allow remote code execution if a user opens a specially crafted Word file. Once an attacker successfully exploited any of these vulnerabilities, he gains user rights
CVE-2011-0092,CVE-2011-0093 This security update addresses two vulnerabilities in Microsoft Visio, could allow remote code execution if a user opens a specially crafted Visio file. An attacker who
CVE-2013-3891,CVE-2013-3892 This security update resolves two privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a specially crafted file
CVE-2015-1649,CVE-2015-1651,CVE-2015-1650 This security update addresses vulnerabilities found existing in Microsoft Office, which could allow remote code execution thus compromising the security of
CVE-2015-2361,CVE-2015-2362 This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution on the vulnerable system. An attacker must have
code execution if a user opens a specially crafted Visio file. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are
CVE-2010-2883 Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code
Description Name: CVE-2021-44832 - LOG4J EXPLOIT - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of netwo...
This Trojan takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to download files on the affected machine. Other Details This Trojan takes
This security update resolves several vulnerabilities found existing in Internet Explorer that could allow remote code execution once successfully exploited via a specially crafted webpage.
code execution via a specially crafted webpage, thus compromising the security of the system. A remote attacker can get the same user rights as the current user if exploited successfully. Windows Server
Microsoft Windows SMB Server (MS17-010) Vulnerability Autostart Technique This Worm registers itself as a system service to ensure its automatic execution at every system startup by adding the following
This Trojan takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware to download files on the affected machine. It takes advantage of certain
Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote attackers to execute arbitrary code via unknown attack vectors.) It saves the files it downloads