Keyword: JS_EXPLOIT
10610 Total Search   |   Showing Results : 1321 - 1340
Description Name: CVE-2023-3519 - CITRIX OVERFLOW EXPLOIT - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this typ...
Description Name: CVE-2023-24489 - Citrix ShareFile Directory Traversal Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The ho...
Description Name: CVE-2024-3272 - D-LINK NAS devices Hardcoded Credential Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The ...
Description Name: CVE-2023-40044 - WS FTP RCE Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of...
Description Name: CVE-2024-28995 - DIRECTORY TRAVERSAL EXPLOIT - HTTP (REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting thi...
Description Name: CVE-2024-7928 - FASTADMIN TRAVERSAL EXPLOIT - HTTP (RESPONSE) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting thi...
Description Name: CVE-2024-7120 - RAISECOM COMMAND INJECTION EXPLOIT - HTTP (RESPONSE) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibit...
Description Name: CVE-2024-5721 - LOGSIGN RCE EXPLOIT - HTTP (RESPONSE) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type o...
Description Name: CVE-2023-44487 - HTTP2 DDOS EXPLOIT - TCP (REQUEST) - Variant 2 . This is Trend Micro detection for TCP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting th...
Description Name: CVE-2024-38652 - IVANTI TRAVERSAL EXPLOIT - HTTP (RESPONSE) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this ...
Description Name: CVE-2023-51364 - QNAP RCE EXPLOIT - HTTP (RESPONSE) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of ...
Description Name: CVE-2024-5932 - GIVEWP RCE EXPLOIT - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of ...
Description Name: CVE-2024-32843 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting t...
Description Name: CVE-2024-32846 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting t...
Description Name: CVE-2024-34785 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting t...
Description Name: CVE-2024-45519 - ZIMBRA RCE EXPLOIT - SMTP (REQUEST) . This is Trend Micro detection for SMTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of...
Description Name: CVE-2024-34779 - IVANTI SQL INJECTION EXPLOIT - HTTP (RESPONSE) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting t...
Description Name: CVE-2024-3400 - Palo Alto Command Injection Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibit...
Description Name: CVE-2024-38112 - MSHTML RCE EXPLOIT - SMB2 (REQUEST) . This is Trend Micro detection for SMB2 network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of...
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It may be