Keyword: JS_EXPLOIT
10457 Total Search   |   Showing Results : 1341 - 1360
Description Name: Possible EQUATED - Remote Code Execution - SMB (Request) . This is Trend Micro detection for SMB network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type...
Description Name: MS17-010 - Remote Code Execution - SMB (Request) - Variant 2 . This is Trend Micro detection for SMB network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this ...
HKEY_CURRENT_USER\Software\Microsoft\ Office\12.0\Word\ Resiliency Other Details This Trojan is a zero-day exploit for the following vulnerability: CVE-2014-1761 For workarounds on the aforementioned vulnerability,
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan may be hosted on a website and run when a user accesses the said website. It takes advantage of an unknown vulnerability in a certain software to allow a remote malicious user or malware
This malware exploits a zero-day vulnerability in some versions of Internet Explorer. Once successfully exploited, it drops a backdoor on the vulnerable computer. As a result, routines of the
This Trojan may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware
of the Android devices to gain root privileges. This malware can get the system version and try to exploit the vulnerabilities inherent to that version. Once it has been grantedroot permission, the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to allow
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to allow
ahead from possible exploit infections, all files found in the system that match established characteristics are immediately detected. If your Trend Micro Virtual Analyzer detects a file under this
This is used as a component of other malware. It exploits a vulnerability in several versions of Oracle Java Runtime Environment (JRE) component. It allows this Trojan to execute arbitrary codes on
This Trojan requires its main component to successfully perform its intended routine. Arrival Details This malware arrives via the following means: component of Angler Exploit Kit hosted in a
the following means: component of an exploit kit via http://81q0k1sfel3a9.{BLOCKED}ds.top/f3a13218f7b635df39e522ae4cbcfb42?win%2021,0,0,213 Other Details For more information on the aforementioned
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user
Description Name: CVE-2017-0145 - Remote Code Execution - SMB (Request) . This is the Trend Micro detection for malicious SMB network packet that manifest any of the following actions:ExploitThis attack is used for Point of Entry or Lateral Movement
Description Name: OSVDB-89030 - Foxit Reader Plugin for Firefox URL String Stack Buffer Overflow . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The ho...