A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?
a4e15bd
Highly Voted 10Â months, 3Â weeks agoExamplary
8Â months, 3Â weeks agoJoeRealCool
Most Recent 2Â months, 3Â weeks agotest_arrow
4Â months, 2Â weeks agojbmac
6Â months agochalaka
7Â months, 1Â week agoHabbiti
7Â months, 3Â weeks agojafyyy
10Â months, 1Â week ago