A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?
a4e15bd
Highly Voted 5 months agoExamplary
3 months, 1 week agojbmac
Most Recent 1 week, 6 days agochalaka
1 month, 3 weeks agoHabbiti
2 months agojafyyy
4 months, 3 weeks ago