A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?
a4e15bd
Highly Voted 8Â months, 2Â weeks agoExamplary
6Â months, 2Â weeks agoJoeRealCool
Most Recent 1Â week, 6Â days agotest_arrow
2Â months agojbmac
3Â months, 3Â weeks agochalaka
5Â months agoHabbiti
5Â months, 1Â week agojafyyy
8Â months ago