Keyword: JS_EXPLOIT
10413 Total Search   |   Showing Results : 1841 - 1860
Description Name: Suspicious Cgi Directory Traversal - HTTP (Request) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting t...
Threat_Behavior_Detection is another type of exploit detection. Trend Micro products are enhanced to detect and stop malicious behaviors from executing in the system. If any exploit-related behavior is detected in your
Description Name: CVE-2019-9517 Internal Data Buffering - HTTP2 (Request) . This is Trend Micro detection for HTTP2 network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely...
Description Name: YEALINK VOIP - COMMAND INJECTION - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is li...
Description Name: APT - SUSPICIOUS CGI - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likely comprom...
Description Name: Meterpreter Powershell - SMB2 (Request) . This is Trend Micro detection for SMB2 network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network beha...
Description Name: HTTP PROXY EXPLOIT - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised by malwa...
Description Name: FLIR - Command Injection - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likely com...
Description Name: Suspicious Cgi Directory Traversal - HTTP (Request) - Variant 3 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting t...
Description Name: Redmine SCM Repository 0.9.x/1.0.x - Remote Command Execution - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The ho...
crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The security update
document. To successfully exploit the vulnerability, an attacker would have to embed a control in an Excel worksheet that specifies a macro should be run. The security update addresses the vulnerability by
This is the Trend Micro detection for the exploit that takes advantage of the Remote Desktop Protocol Vulnerability (CVE-2012-0002). The vulnerability refers to how desktops and servers using various
This Exploit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
Description Name: JBOSS JMX CONSOLE MAIN DEPLOYER EXPLOIT - HTTP (Request) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavi...
Description Name: JNAP Information Disclosure Attempt - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Data Exfiltration.The host exhibiting this type of network behavior...
Description Name: CVE-2020-8617 - NXNSATTACK - DNS (REQUEST) . This is Trend Micro detection for DNS network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network b...
Description Name: Hotmail cross-site scripting exploit - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that manifests Exploit activities which can be a potential intrusion. Below are some indicators...
Description Name: IRIS Remote Command Execution - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likel...
Description Name: POSSIBLE XSS Variant 2 - HTTP (REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network beha...