Keyword: JS_EXPLOIT
10410 Total Search   |   Showing Results : 1161 - 1180
Description Name: CVE-2024-1709 - ConnectWise ScreenConnect Authentication Bypass Exploit - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Move...
Description Name: CVE-2023-41265 - QLIK Request Tunneling Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting ...
Description Name: CVE-2024-4956 - Nexus Repository 3 Path Traversal Exploit - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host ...
Description Name: CVE-2024-20767 - Cold Fusion Directory Traversal Exploit - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host e...
Description Name: CVE-2024-3400 - Palo Alto Command Injection Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibit...
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be unknowingly
\livetv\chrome\skin\lib\panels\images %Program Files%\livetv\chrome\skin\lib\panels\js %Program Files%\livetv\chrome\skin\lib\radio %Program Files%\livetv\chrome\skin\lib\radio\css %Program Files%\livetv
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
\ephdpnpjnldjojklnkgcgladikdfomcb\1.0.0_0 1\Extensions\ephdpnpjnldjojklnkgcgladikdfomcb\1.0.0_0\img 1\Extensions\odociggmedpfmeocpghedjmilfdicmgl\1.0.0_0\res\css 1\Extensions\odociggmedpfmeocpghedjmilfdicmgl\1.0.0_0\res\js 1
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
Maker\Shared\DvdStyles\Pets\Title_Page_Ref.wmv %System Root%\Program Files\VMware\VMware Tools\help\wwhdata\js\search\pairs\pair11.js %System Root%\Program Files\DVD Maker\Shared\DvdStyles\Sports
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
\DOCUME~1\Wilbert %User Profile%\LOCALS~1 %User Temp%\RarSFX0 fwzs fwzs\Bin fwzs\Bin\download fwzs\Bin\UI fwzs\Bin\UI\JS fwzs\Bin\UI\Style fwzs\Bin\UI\Style\Css fwzs\Bin\UI\Style\Images %User Temp%\RarSFX0
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. Arrival Details
\plugins %Program Files%\IEPro\plugins\accuweather %Program Files%\IEPro\plugins\accuweather\css %Program Files%\IEPro\plugins\accuweather\images %Program Files%\IEPro\plugins\accuweather\js %Program Files%
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This File infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and