Keyword: JS_EXPLOIT
10413 Total Search   |   Showing Results : 1901 - 1920
Description Name: CVE-2021-40870 - DIRECTORY TRAVERSAL - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of...
Description Name: CVE-2021-4039 - ZYXEL NWA COMMAND INJECTION - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this ...
Description Name: CVE-2019-18935 - TELERIK UI RCE - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of netw...
Description Name: CVE-2022-22954 - WORKSPACE ONE RCE - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of n...
Description Name: CVE-2022-24112 - APACHE APISIX RCE - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of n...
Description Name: CVE-2022-47966 - ZOHO MANAGEENGINE RCE - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type ...
Description Name: CVE-2022-38129 - KEYSIGHT SMS DIRECTORY TRAVERSAL - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting...
Description Name: CVE-2022-40300 - ZOHO MANAGEENGINE SQL CODE INJECTION - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhib...
Description Name: CVE-2022-35951 - REDIS INTEGER OVERFLOW - TCP(REQUEST) . This is Trend Micro detection for TCP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type o...
This Exploit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It takes advantage of software vulnerabilities to allow
Description Name: CVE-2023-42793 - Teamcity Server - HTTP(Response) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of ne...
Installation This Exploit takes advantage of the following vulnerability/vulnerabilities to elevate privileges: CVE-2015-1538: Integer overflow in libstagefright parsing crafted MP4 video
This JavaScript loads another JavaScript also detected as JS_KOOBFACE.AC. The said file redirects to another URL. This Trojan may be dropped by other malware. Arrival Details This Trojan may be
This Trojan may be hosted on a website and run when a user accesses the said website. Arrival Details This Trojan may be hosted on a website and run when a user accesses the said website. NOTES: This
\pkg_1035415a0\AskTB %User Temp%\pkg_1035415a0\installiq_v2e %User Temp%\pkg_1035415a0\installiq_v2e\js %User Temp%\pkg_1035415a0\installiq_v2e\template_skin %User Temp%\pkg_1035415a0\product.iq.openfreely %User
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that contain a malicious script. It redirects browsers to certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user