Keyword: ms
3244 Total Search   |   Showing Results : 81 - 100
Description Name: CVE-2016-1555 - Netgear Devices - Unauthenticated Remote Code Execution - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this ty...
Description Name: CVE-2018-17173 LG Supersign Remote Code Execution - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior...
Description Name: CVE-2019-8942 WordPress Image Remote Code Execution Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of networ...
Description Name: CVE-2019-0547 Client Remote Code Execution Exploit - DHCP (Response) . This is Trend Micro detection for DHCP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavi...
Description Name: CVE-2015-2280 AirLink OS Command Injection - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is lik...
Description Name: CVE-2017-0171 - Denial of Service - DNS (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compr...
refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1003972|2/10/2010 2:30:42 AM 1003972 - MS Paint Integer Overflow Vulnerability
filter name when applying appropriate DPI and/or IDF rules. 1000784| 1000784 - MS IIS Frontpage Server Extensions Path Disclosure
from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules. 1004350| 1004350 - MS Internet Explorer Uninitialized Memory
Description Name: CVE-2017-6884 Zyxel OS Command Injection Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior ...
Description Name: CVE-2013-2115 - APACHE STRUTS EXPLOIT - HTTP(Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type o...
Description Name: CVE-2016-3081 - Remote Code Execution - HTTP (Request) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior...
Description Name: CVE-2018-9206 - JQuery Arbitrary File Upload Exploit Attempt - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of netwo...
Description Name: CVE-2019-9518 Empty Frames Flood - HTTP2 (Request) . This is Trend Micro detection for HTTP2 network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely comp...
Description Name: CVE-2019-9517 Internal Data Buffering - HTTP2 (Request) . This is Trend Micro detection for HTTP2 network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely...
Description Name: Possible Malformed Heartbeat SSL Response - Class 1 . This is Trend Micro detection for TCP, SSL and HTTPS network protocol that manifests exploit activities and can be used for Intelligence Gathering.The host exhibiting this type o...
Description Name: Possible Malformed Heartbeat SSL Response - Class 2 . This is Trend Micro detection for TCP, SSL and HTTPS network protocol that manifests exploit activities and can be used for Intelligence Gathering.The host exhibiting this type o...
Description Name: CVE-2019-9515 SETTINGS Flood - HTTP2 (Request) . This is Trend Micro detection for HTTP2 network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromi...
Description Name: CVE-2019-9512 PING Flood - HTTP2 (Request) . This is Trend Micro detection for HTTP2 network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised ...
Description Name: CVE-2009-3103 - Remote Code Execution - SMB2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised...