A security analyst is investigating an application server and discovers that software on the server is behaving abnormally. The software normally runs batch jobs locally and does not generate traffic, but the process is now generating outbound traffic over random high ports. Which of the following vulnerabilities has likely been exploited in this software?
a4e15bd
Highly Voted 9Â months agoExamplary
7Â months agoJoeRealCool
Most Recent 1Â month agotest_arrow
2Â months, 3Â weeks agojbmac
4Â months, 1Â week agochalaka
5Â months, 2Â weeks agoHabbiti
6Â months agojafyyy
8Â months, 2Â weeks ago