Keyword: JS_EXPLOIT
10460 Total Search   |   Showing Results : 2681 - 2700
Description Name: CRAM-MD5 Authentication Buffer Overflow - IMAP4 (Request) . This is the Trend Micro detection for malicious IMAP4 network packet that manifest any of the following actions:ExploitThis attack is used for Point of Entry
Description Name: Possible CVE-2018-8413 Windows Theme API RCE Download - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhi...
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. It takes advantage of certain
This is the detection for the second stage malware related to the new Java zero-day exploit which was used in the targeted attack campaign, Operation Pawn Storm. In the second stage of the attack, it
This is the detection for the third stage malware related to the new Java zero-day exploit that was used in the targeted attack campaign, Operation Pawn Storm. In the first stage of the infection
component bundled with malware/grayware packages. Other Details This Trojan requires its main component to successfully perform its intended routine. It is a zero-day exploit for the following vulnerability:
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This is Trend Micros detection for all .EMF graphics files that have been modified to exploit the Microsoft Windows XP Metafile Heap Overflow vulnerability. NOTES: This is Trend Micros detection for
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This malware uses the exploit targeting (MS13-022) Vulnerability in Silverlight Could Allow Remote Code Execution (2814124) vulnerability. The said exploit was found to be the payload of a series of
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
files: http://{BLOCKED}.bedircati.com/web/anyway.gif Other Details This Trojan is a zero-day exploit for the following vulnerability: CVE-2014-1776 Exploit.SWF.Agent.ig (Kaspersky),
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It does not have any propagation routine. It
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the