Keyword: possible
509 Total Search   |   Showing Results : 141 - 160
certain vectors associated with launching "a file handling program based on the file extension at the end of the URI," a variant of CVE-2007-4041. NOTE: the vendor states that "it is still possible to
Description Name: Grayware-related User-Agent string in header - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocol that manifests hacking tool actions that can generally crack or break systems and networ...
Description Name: FIREBALL - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocol that manifests hacking tool actions that can generally crack or break systems and network security measures. Hacking tools h...
Description Name: SUPERFISH - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocol that manifests hacking tool actions that can generally crack or break systems and network security measures. Hacking tools ...
Description Name: Possible CVE-2018-8413 Windows Theme API RCE Download - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhi...
wild. It is a heuristic detection based on well-established characteristics inherent to compressed malware. To keep customers a step ahead from possible malware infections, all executable files found in
wild. It is a heuristic detection based on well-established characteristics inherent to compressed malware. To keep customers a step ahead from possible malware infections, all executable files found in
wild. It is a heuristic detection based on well-established characteristics inherent to compressed malware. To keep customers a step ahead from possible malware infections, all executable files found in
Description Name: Possible CVE-2019-1663 CISCO RV Routers Buffer Overflow Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The ...
Description Name: Possible CVE-2019-1040 MS NTLM Tampering Exploit - SMB (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting ...
Description Name: Possible Directory Traversal Exploit Attempted - Messagebody - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The hos...
Description Name: Possible HTML Shifting . This is Trend Micro detection for packets passing through HTTP network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indicators of unusual behavior:Suspicious a...
Description Name: Possible FAKEAV - URL request . This is Trend Micro detection for packets passing through HTTP network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual behavior:Su...
Description Name: IIS - SCANNER - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocol that manifests hacking tool actions that can generally crack or break systems and network security measures. Hacking to...
Description Name: Possible Directory Traversal Exploit Attempted - URI Variable/URI Path - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Moveme...
Description Name: Possible CVE-2019-0227 Apache Axis Expired Domain to RCE - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host ex...
Description Name: Possible CVE-2020-1206 - BLEED EXPLOIT - (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of ...
Description Name: Possible buffer overflow . This is Trend Micro detection for packets passing through SMB network protocols that manifests Exploit activities which can be a potential intrusion. Below are some indicators of unusual behavior:Suspiciou...
Description Name: Possible HTML Chaffing . This is Trend Micro detection for packets passing through HTTP network protocols that manifests unusual behavior which can be a potential intrusion. Below are some indicators of unusual behavior:Suspicious a...
Description Name: Possible CVE-2019-16928 - Exim Buffer Overflow Exploit - SMTP (Request) . This is Trend Micro detection for SMTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhi...