Keyword: JS_EXPLOIT
10460 Total Search   |   Showing Results : 2661 - 2680
It propagates by dropping copies of itself in physical and removable drives. It also propagates over the Internet by attempting to send the exploit code to random Internet addresses. It generates a
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to the following email messages
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
CVE-2006-4694 Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office XP and Office 2003 allows user-assisted attackers to execute arbitrary code via a crafted record in a PPT file,
Windows RSH daemon 1.7 Apply associated Trend Micro DPI Rules. 1001324| 1001324 - Microsoft Windows RSH Daemon Remote Buffer Overflow Exploit
the filter number and filter name when applying appropriate DPI and/or IDF rules. 1000140| 1000140 - Oracle Database Server XML Database Component Buffer Overflow Exploit (shell)
CVE-2012-4969 A remote code execution vulnerability in Internet Explorer versions 6, 7, 8, and 9 is being used in some targeted attacks. Visiting a website or webpage where the exploit is hosted may
Description Name: FLASH EXPLOIT - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as N/A. This also indicates a malware infection. Below are some indicators of an infected host:Excess...
Description Name: Command Execution - SMB (Request) . This is Trend Micro detection for packets passing through SMB network protocols that can be used as Point of Entry or Lateral Movement. This also indicates a malware infection. Below are some indi...
Description Name: FALLOUT - Exploit Kit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised by ma...
Description Name: EXAMINE Buffer Overflow - IMAP4 (Request) . This is Trend Micro detection for IMAP4 network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likely co...
Description Name: ZOLLARD Command Execution - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Point of Entry or Lateral Movement. This also indicates a malware infection. Below are...
Description Name: NUUO Command Injection - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised by m...
Description Name: UNDERMINER - Exploit Kit - HTTP (Request) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely co...
Description Name: DIRECTORY TRAVERSAL on Unknown Protocol . This is Trend Micro detection for packets passing through TCP network protocols that can be used as Point of Entry or Lateral Movement. This also indicates a malware infection. Below are som...
Description Name: Remote PHP-CGI Command Execution - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Point of Entry or Lateral Movement. This also indicates a malware infection. Be...
Description Name: YERSINIA - ICMP (Request) . This is Trend Micro detection for ICMP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised by malware, or bei...