Keyword: JS_EXPLOIT
10409 Total Search   |   Showing Results : 941 - 960
Description Name: CVE-2016-6366 - EXTRABACON - SNMP . This is Trend Micro detection for UDP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type of network behavior is...
Description Name: DLINK DIR8xx leak credentials exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type ...
Description Name: AVTECH Authentication ByPass Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type o...
Description Name: CVE-2017-0147 - Information Disclosure Exploit - SMB (Request) . This is the Trend Micro detection for malicious SMB network packet that manifest any of the following actions:ExploitThis attack is used for Point of Entry or Lateral ...
Description Name: CVE-2016-10134 - Zabbix SQL Injection - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type ...
Description Name: VACRON Remote Code Execution Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type o...
Description Name: DLINK Command Injection Exploit - HTTP (Request) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this...
Description Name: KAIXIN - Exploit Kit - HTTP (Request) - Variant 3 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is li...
This Exploit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are
This proof of concept attempts to exploit a vulnerability known as Spectre. If successful, it allows exploitation of said vulnerability in Mac OS systems. Exploitation of said vulnerability is
This Exploit arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Exploit arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
Description Name: MAGNITUDE - Exploit kit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is likely comp...
Description Name: CVE-2017-12635 Apache CouchDB Escalation Privelage - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiti...
Description Name: LINKSYS Unauthenticated Remote Code Execution Exploit - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhib...
Description Name: CVE-2015-5254 - ActiveMQ Deserialization Vulnerability . This is Trend Micro detection for TCP network protocol that manifests exploit activities and can be used for Point of Entry or Lateral Movement.The host exhibiting this type o...
Description Name: KAIXIN - Exploit Kit - HTTP (Request) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Point of Entry.The host exhibiting this type of network behavior is li...
users when visiting malicious sites. Other Details This Trojan is a zero-day exploit for the following vulnerability: (MS13-022) Vulnerability in Silverlight Could Allow Remote Code Execution (2814124)
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by other malware. NOTES: It exploits the following vulnerability: CVE-2015-1701 If the exploit is successful,