Keyword: JS_EXPLOIT
10435 Total Search   |   Showing Results : 1861 - 1880
This is the Trend Micro detection for the exploit that takes advantage of the Remote Desktop Protocol Vulnerability (CVE-2012-0002). The vulnerability refers to how desktops and servers using various
This Exploit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
Description Name: JBOSS JMX CONSOLE MAIN DEPLOYER EXPLOIT - HTTP (Request) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavi...
Description Name: JNAP Information Disclosure Attempt - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Data Exfiltration.The host exhibiting this type of network behavior...
Description Name: CVE-2020-8617 - NXNSATTACK - DNS (REQUEST) . This is Trend Micro detection for DNS network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network b...
Description Name: Hotmail cross-site scripting exploit - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that manifests Exploit activities which can be a potential intrusion. Below are some indicators...
Description Name: IRIS Remote Command Execution - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likel...
Description Name: POSSIBLE XSS Variant 2 - HTTP (REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network beha...
Description Name: CVE-2019-9515 SETTINGS Flood - HTTP2 (Request) . This is Trend Micro detection for HTTP2 network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromi...
Description Name: AXIS2 GETSHELL - COMMAND INJECTION - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is ...
Description Name: CVE-2019-9512 PING Flood - HTTP2 (Request) . This is Trend Micro detection for HTTP2 network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised ...
Description Name: BLUEANGEL - Comand Injection - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likely...
This Exploit arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
Description Name: CVE-2014-2206 - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised by malware, ...
Description Name: CVE-2009-3103 - Remote Code Execution - SMB2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised...
Description Name: Window Shell Remote Code Execution - HTTP (Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of...
Description Name: Possible RIG Exploit Kit - HTTP (Request) .
Description Name: CVE-2019-9511 Data Dribble - HTTP2 (Request) . This is Trend Micro detection for HTTP2 network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromise...
Description Name: Suspicious File Upload - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network beha...
Description Name: Suspicious Cgi Arbitrary File Upload - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type o...