Keyword: JS_EXPLOIT
10591 Total Search   |   Showing Results : 3201 - 3220
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
exploit kit Propagation This Trojan does not have any propagation routine. Backdoor Routine This Trojan does not have any backdoor routine. Other Details This Trojan requires its main component to
This is the detection for the third stage malware related to the new Java zero-day exploit that was used in the targeted attack campaign, Operation Pawn Storm. In the first stage of the infection
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
component bundled with malware/grayware packages. Other Details This Trojan requires its main component to successfully perform its intended routine. It is a zero-day exploit for the following vulnerability:
NOTES: This is the Trend Micro detection for malicious network packets that may manifest any of the following actions: Reading of arbitrary files on the remote system If your Trend Micro product
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
NOTES: This is the Trend Micro detection for malicious network packets that may manifest any of the following actions: Reading of arbitrary files on the remote system Additional information can be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
Description Name: FLASH EXPLOIT - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as N/A. This also indicates a malware infection. Below are some indicators of an infected host:Excess...
Description Name: YERSINIA - ICMP (Request) . This is Trend Micro detection for ICMP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised by malware, or bei...
Description Name: EXAMINE Buffer Overflow - IMAP4 (Request) . This is Trend Micro detection for IMAP4 network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likely co...
Description Name: CRAM-MD5 Authentication Buffer Overflow - IMAP4 (Request) . This is the Trend Micro detection for malicious IMAP4 network packet that manifest any of the following actions:ExploitThis attack is used for Point of Entry
Description Name: Command Execution - SMB (Request) . This is Trend Micro detection for packets passing through SMB network protocols that can be used as Point of Entry or Lateral Movement. This also indicates a malware infection. Below are some indi...
Description Name: FALLOUT - Exploit Kit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised by ma...
Description Name: Possible CVE-2018-8413 Windows Theme API RCE Download - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhi...
Description Name: NUUO Command Injection - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised by m...
Description Name: Remote PHP-CGI Command Execution - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Point of Entry or Lateral Movement. This also indicates a malware infection. Be...
Description Name: DIRECTORY TRAVERSAL on Unknown Protocol . This is Trend Micro detection for packets passing through TCP network protocols that can be used as Point of Entry or Lateral Movement. This also indicates a malware infection. Below are som...
Description Name: ZOLLARD Command Execution - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Point of Entry or Lateral Movement. This also indicates a malware infection. Below are...