Keyword: JS_EXPLOIT
10409 Total Search   |   Showing Results : 961 - 980
Description Name: Bleeding Life - Exploit Kit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likely ...
Description Name: CVE-2017-8543 - Remote Code Execution - SMB2 (Request) . This is Trend Micro detection for SMB2 network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type ...
Description Name: Possible WEBLOGIC T3 RCE Exploit - TCP (Request) . This is Trend Micro detection for TCP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of netw...
Description Name: CVE-2018-5443 Advantech Webaccess SQL Injection - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting ...
Description Name: CVE-2016-4438 - Remote Code Execution - HTTP (Request) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibitin...
Description Name: CVE-2018-3606 TMCM SQL Injection Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this ty...
Description Name: DLINK Command Injection Exploit - HTTP (Request) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this...
Description Name: KAIXIN - Exploit Kit - HTTP (Request) - Variant 3 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is li...
This Exploit arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Exploit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. As of this writing, the said sites are inaccessible.
Description Name: NUCLEAR - Exploit kit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likely compro...
Description Name: SUNDOWN - Exploit Kit - HTTP(Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likely comprom...
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan arrives as a
users when visiting malicious sites. Other Details This Trojan is a zero-day exploit for the following vulnerability: (MS13-022) Vulnerability in Silverlight Could Allow Remote Code Execution (2814124)
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: It exploits the following vulnerability: CVE-2015-1701 If the exploit is successful,
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: It exploits the following vulnerability: CVE-2015-1701 If the exploit is successful,
website and run when a user accesses the said website. Other Details This Trojan is a zero-day exploit for the following vulnerability: CVE-2014-1776 NOTES: It allocates and executes an arbitrary shellcode
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. It takes advantage of certain
}.111.219/ipaddrs/shell It is a zero-day exploit for the following vulnerability: CVE-2013-5331 Troj/SWFExp-CH (Sophos) ,Trojan horse Exploit_c.YZX (AVG) ,Exploit.Win32.CVE-2013 (Ikarus) ,HEUR:Exploit.SWF.CVE-2013-5331.a
properly. HEUR:Exploit.SWF.Agent.gen (Kaspersky) Adobe Releases Patch for Flash Zero-Day Vulnerability Analyzing the CVE-2014-0515 Exploit – The Recent Flash Zero-Day Downloaded from the Internet