Keyword: JS_EXPLOIT
10409 Total Search   |   Showing Results : 741 - 760
Description Name: CVE-2023-49070 - Apache OFBiz Pre-Auth RCE Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiti...
Description Name: CVE-2023-25717 - Ruckus RCE Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of...
Description Name: CVE-2023-47246 - SYSAID TRAVERSAL EXPLOIT - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this t...
Description Name: CVE-2023-34127 - SonicWall Command Injection Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibi...
Description Name: CVE-2021-20016 - SonicWall SSLVPN SMA100 SQL Injection Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The h...
Description Name: CVE-2023-32315 - Ignite Realtime Openfire Directory Traversal Exploit - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Moveme...
Description Name: CVE-2023-48788 - FortiClientEMS SQL Injection Exploit - TCP (Request) . This is Trend Micro detection for TCP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibit...
Description Name: CVE-2024-23692 - Rejetto HTTP File Server Command Injection Exploit - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement...
%Program Files%\leyoubox\Cache\box_new\item_wl.html %Program Files%\leyoubox\Cache\box_new\item_wy.html %Program Files%\leyoubox\Cache\box_new\js\box2.js %Program Files%\leyoubox\Cache\box_new\js
\Rar.exe" a -y -ep -inul -k -m0 -hp"{%.FS\sgs5@B{S8pd8@vfuS,)ax-=Tog" "%AppDataLocal%\Google\Chrome\User Data\Default\Extensions\efaidnbmnnnibpcajpcglclefindmkaj\15.1.1.0_0\data\js\44 \xd0\xa4\xd0\xb0\xd0
\User Data\Default\Extensions\{Extension ID}\13.917.16.52171_0\js\ajax.js %AppDataLocal%\Google\Chrome\User Data\Default\Extensions\{Extension ID}\13.917.16.52171_0\js\babAPI.js %AppDataLocal%\Google
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Once users access any of the monitored sites, it starts logging keystrokes. It attempts to steal information, such as user names and passwords, used when logging into certain banking or
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
\DriverPack-20190711230559\js %User Temp%\DriverPack-20190711230559\img\onboarding-new\stories %User Temp%\DriverPack-20190711230559\img\installation\soft %User Temp%\DriverPack-20190711230559\img\screens %User Temp%
\onboarding-new %User Temp%\DriverPack-2019080665020\img\bugreport %User Temp%\DriverPack-2019080665020\Tools %User Temp%\DriverPack-2019080665020\js %User Temp%\DriverPack-2019080665020\img\no_internet %User Temp%
\DriverPack-2019062780359\img\onboarding-new\stories %User Temp%\DriverPack-2019062780359\img\installation\drivers %User Temp%\DriverPack-2019062780359\js %User Temp%\DriverPack-2019062780359 %User Temp%
\DriverPack-20191016194341\img\device-class %User Temp%\DriverPack-20191016194341\img\onboarding %User Temp%\DriverPack-20191016194341\js %User Temp%\DriverPack-20191016194341\css\fonts\ProximaNova %User Temp%
\charms %User Temp%\DriverPack-20190919100135\js %User Temp%\DriverPack-20190919100135\img\onboarding %User Temp%\DriverPack-20190919100135\css\fonts\DRPcheckbox %User Temp%\DriverPack-20190919100135\img