Search
Keyword: JS_EXPLOIT
This Trojan may be hosted on a website and run when a user accesses the said website. It requires its main component to successfully perform its intended routine. Arrival Details This Trojan may be
Description Name: CVE-2016-0128 - Windows Downgrade Vulnerability - DCE-RPC . This is Trend Micro detection for SMB2 and DCE-RPC network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibi...
Description Name: CVE-2015-0235 - GHOST SMTP Exploit . This is Trend Micro detection for SMTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network behavior ...
Description Name: IE EXPLOIT CVE-2015-0072 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network behavior is likely ...
Description Name: CVE-2012-0394 - APACHE STRUTS EXPLOIT - HTTP(Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type o...
Description Name: CVE-2017-12611 - APACHE STRUTS EXPLOIT - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type...
Description Name: RIG Exploit - HTTP (Request) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likely comp...
Description Name: CVE-2016-0128 - Unencrypted Authentication Level - SAMR (Request) . This is Trend Micro detection for SMB2 and DCE-RPC network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The hos...
Description Name: CVE-2018-6389 WordPress Load-Scripts Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting thi...
Description Name: CVE-2018-12613 PHPMyAdmin Remote Code Execution Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exh...
Description Name: CVE-2015-1635 - Range HTTP Exploit . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network behavior ...
Description Name: CVE-2017-9791 - APACHE STRUTS EXPLOIT - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type ...
Description Name: CVE-2017-5689 - Intel AMT Digest Authentication Bypass exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The h...
Description Name: CVE-2013-2115 - APACHE STRUTS EXPLOIT - HTTP(Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type o...
Description Name: CVE-2013-2251 - APACHE STRUTS EXPLOIT - HTTP(Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type o...
Description Name: CVE-2013-2618 Network Weathermap Remote Code Execution Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The h...
Description Name: CVE-2017-12149 - JBOSSAS COMMAND EXECUTION EXPLOIT - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiti...
Description Name: CVE-2017-6736 - Remote Code Execution Exploit - SNMP (Request) . This is Trend Micro detection for SNMP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting th...
Description Name: CVE-2017-3506 - Oracle Weblogic Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavio...
Description Name: CVE-2018-9995 Authentication Bypass Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this...