Keyword: JS_EXPLOIT
10453 Total Search   |   Showing Results : 981 - 1000
users when visiting malicious sites. Other Details This Trojan is a zero-day exploit for the following vulnerability: (MS13-022) Vulnerability in Silverlight Could Allow Remote Code Execution (2814124)
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: It exploits the following vulnerability: CVE-2015-1701 If the exploit is successful,
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: It exploits the following vulnerability: CVE-2015-1701 If the exploit is successful,
website and run when a user accesses the said website. Other Details This Trojan is a zero-day exploit for the following vulnerability: CVE-2014-1776 NOTES: It allocates and executes an arbitrary shellcode
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. It takes advantage of certain
}.111.219/ipaddrs/shell It is a zero-day exploit for the following vulnerability: CVE-2013-5331 Troj/SWFExp-CH (Sophos) ,Trojan horse Exploit_c.YZX (AVG) ,Exploit.Win32.CVE-2013 (Ikarus) ,HEUR:Exploit.SWF.CVE-2013-5331.a
properly. HEUR:Exploit.SWF.Agent.gen (Kaspersky) Adobe Releases Patch for Flash Zero-Day Vulnerability Analyzing the CVE-2014-0515 Exploit – The Recent Flash Zero-Day Downloaded from the Internet
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. Download
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a
This Exploit arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Exploit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
Description Name: NTOP RCE Exploit - HTTP (Request) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of networ...
Description Name: CVE-2017-8917 - JOOMLA - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likely compr...
Description Name: NXT Eyelock RCE Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network beh...
Description Name: Sapido RCE Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network behavior...
Description Name: CVE-2019-1182 Chopper Compression Overflow Remote Code Execution - RDP (Request) . This is Trend Micro detection for RDP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The h...
Description Name: RIG - Exploit Kit - HTTP (Request) - Variant 8 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likel...
Description Name: CVE-2019-11539 Pulse Secure Command Injection - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting th...