Keyword: JS_EXPLOIT
10437 Total Search   |   Showing Results : 2661 - 2680
the filter number and filter name when applying appropriate DPI and/or IDF rules. 1000140| 1000140 - Oracle Database Server XML Database Component Buffer Overflow Exploit (shell)
CVE-2006-4694 Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office XP and Office 2003 allows user-assisted attackers to execute arbitrary code via a crafted record in a PPT file,
Windows RSH daemon 1.7 Apply associated Trend Micro DPI Rules. 1001324| 1001324 - Microsoft Windows RSH Daemon Remote Buffer Overflow Exploit
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may arrive
CVE-2012-4969 A remote code execution vulnerability in Internet Explorer versions 6, 7, 8, and 9 is being used in some targeted attacks. Visiting a website or webpage where the exploit is hosted may
Description Name: UNDERMINER - Exploit Kit - HTTP (Request) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely co...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. It takes advantage of certain
This is the detection for the second stage malware related to the new Java zero-day exploit which was used in the targeted attack campaign, Operation Pawn Storm. In the second stage of the attack, it
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
NOTES: This is the Trend Micro detection for malicious network packets that may manifest any of the following actions: Remote command execution If your Trend Micro product detects malicious network
This is Trend Micros detection for all .EMF graphics files that have been modified to exploit the Microsoft Windows XP Metafile Heap Overflow vulnerability. NOTES: This is Trend Micros detection for
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
This malware uses the exploit targeting (MS13-022) Vulnerability in Silverlight Could Allow Remote Code Execution (2814124) vulnerability. The said exploit was found to be the payload of a series of
files: http://{BLOCKED}.bedircati.com/web/anyway.gif Other Details This Trojan is a zero-day exploit for the following vulnerability: CVE-2014-1776 Exploit.SWF.Agent.ig (Kaspersky),
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded