Keyword: ms
3244 Total Search   |   Showing Results : 241 - 260
Description Name: CVE-2022-0435 - TIPC BUFFEROVERFLOW EXPLOIT - UDP(REQUEST) . This is Trend Micro detection for UDP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this ty...
Description Name: CVE-2022-40144 - Trend Micro Apex One Login Authentication Bypass Exploit - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibi...
Description Name: CVE-2022-47966 - ZOHO MANAGEENGINE RCE - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type ...
Description Name: CVE-2022-35951 - REDIS INTEGER OVERFLOW - TCP(REQUEST) . This is Trend Micro detection for TCP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type o...
Description Name: CVE-2022-21587 - ORACLE DESKTOP INTEGRATOR DIRECTORY TRAVERSAL EXPLOIT - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibitin...
Description Name: CVE-2022-40624 - NETGATE RCE EXPLOIT - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of...
Description Name: CVE-2023-42121 - CONTROLWEBPANEL RCE EXPLOIT - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this...
Description Name: CVE-2023-42793 - Teamcity Server - HTTP(Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of ne...
Description Name: CVE-2022-27255 - SIP BUFFEROVERFLOW EXPLOIT - ICMP(REQUEST) . This is Trend Micro detection for ICMP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this ...
Description Name: CVE-2024-5806 - MOVEit Authentication Bypass Exploit - HTTP(Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibit...
Description Name: CVE-2024-24919 - Check Point Information Disclosure Exploit - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Data Exfiltration.The host exhibiting this...
Description Name: CVE-2023-44414 - DLINK RCE EXPLOIT - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of n...
Description Name: CVE-2024-36401 - GEOSERVER EXPLOIT - HTTP (REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of ...
Description Name: CVE-2024-32766 - PRIVWIZARD INJECTION EXPLOIT - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network b...
Description Name: CVE-2024-6497 - SQUIRLLY EXPLOIT - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is li...
Description Name: CVE-2024-5932 - WordPress RCE Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior ...
%\dw20.EXE - detected as BKDR_INJECT.PRM It then terminates the legitimate MS Word process WINDWORD.EXE execuate a new instance of WINWORD.EXE , to trick users into thinking that it is a normal
Description Name: CVE-2018-8476 Windows Deployment Services Remote Code Execution Exploit - TFTP (Request) . This is Trend Micro detection for TFTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movem...
Description Name: CVE-2018-8653 MSIE Remote Code Execution - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this t...
Description Name: CVE-2018-7602 - Remote Code Execution - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type ...