text
stringlengths 0
383k
|
---|
WebAttackMaliciousJavaDownload4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability in JRE Java which may result in remote code execution.
Additional Information
Oracle Java SE is prone to a remote denial-of-service vulnerability in Java Runtime Environment. Specifically, the issue occurs because the application fails to properly check if an array is of an expected Object[] type. An attacker can exploit this issue to cause Java Virtual Machine to crash or bypass Java sandbox restrictions.
An attacker can exploit this issue to cause the application to crash, denying service to legitimate users.
This vulnerability affects the following supported versions:
7 Update 2, 6 Update 30, 5.0 Update 33
Affected
Oracle Java 7 Update 2, 6 Update 30, 5.0 Update 33
Response
Updates are available. Please see the references for more information.
|
WebAttackMaliciousJavaDownload5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Blackhole Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Web Browsers
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
|
WebAttackMaliciousJavaDownload6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability in JRE Java which may result in remote code execution.
Additional Information
Oracle Java SE is prone to a remote denial-of-service vulnerability in Java Runtime Environment. Specifically, the issue occurs because the application fails to properly check if an array is of an expected Object[] type. An attacker can exploit this issue to cause Java Virtual Machine to crash or bypass Java sandbox restrictions.
An attacker can exploit this issue to cause the application to crash, denying service to legitimate users.
This vulnerability affects the following supported versions:
7 Update 2, 6 Update 30, 5.0 Update 33
Affected
Oracle Java 7 Update 2, 6 Update 30, 5.0 Update 33
Response
Updates are available. Please see the references for more information.
|
WebAttackMaliciousJavaDownload7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability in JRE Java which may result in remote code execution.
Additional Information
Oracle Java SE is prone to a remote denial-of-service vulnerability in Java Runtime Environment. Specifically, the issue occurs because the application fails to properly check if an array is of an expected Object[] type. An attacker can exploit this issue to cause Java Virtual Machine to crash or bypass Java sandbox restrictions.
An attacker can exploit this issue to cause the application to crash, denying service to legitimate users.
This vulnerability affects the following supported versions:
7 Update 2, 6 Update 30, 5.0 Update 33
Affected
Oracle Java 7 Update 2, 6 Update 30, 5.0 Update 33
Response
Updates are available. Please see the references for more information.
|
WebAttackMaliciousJavaDownload8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability in JRE Java which may result in remote code execution.
Additional Information
Oracle Java SE is prone to a remote denial-of-service vulnerability in Java Runtime Environment. Specifically, the issue occurs because the application fails to properly check if an array is of an expected Object[] type. An attacker can exploit this issue to cause Java Virtual Machine to crash or bypass Java sandbox restrictions.
An attacker can exploit this issue to cause the application to crash, denying service to legitimate users.
This vulnerability affects the following supported versions:
7 Update 2, 6 Update 30, 5.0 Update 33
Affected
Oracle Java 7 Update 2, 6 Update 30, 5.0 Update 33
Response
Updates are available. Please see the references for more information.
|
WebAttackMaliciousJavaDownload9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability in JRE Java which may result in remote code execution.
Additional Information
Oracle Java SE is prone to a remote denial-of-service vulnerability in Java Runtime Environment. Specifically, the issue occurs because the application fails to properly check if an array is of an expected Object[] type. An attacker can exploit this issue to cause Java Virtual Machine to crash or bypass Java sandbox restrictions.
An attacker can exploit this issue to cause the application to crash, denying service to legitimate users.
This vulnerability affects the following supported versions:
7 Update 2, 6 Update 30, 5.0 Update 33
Affected
Oracle Java 7 Update 2, 6 Update 30, 5.0 Update 33
Response
Updates are available. Please see the references for more information.
|
WebAttackMaliciousJavaDownloadAttack5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit Java 'Applet2ClassLoader' Class Unsigned Applet Remote Code Execution Vulnerability.
Additional Information
Oracle Java is prone to a remote code-execution vulnerability in the Java Runtime Environment. The 'findClass()' method of the 'sun.plugin2.applet.Applet2ClassLoader' class fails to properly validate URLs supplied to it by an unsigned applet. Specifically, when loading a class from a URL, the method fails to check if the URL matches the protocol, host, and port of the document containing the applet. An attacker can exploit this to load a class located at an attacker controlled site, in the context of the targeted site.
An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges.
This vulnerability affects the following supported versions:
6 Update 23
Affected
Sun JRE (Windows Production Release) 1.6 _17
Sun JRE (Windows Production Release) 1.6 _13
Sun JRE (Windows Production Release) 1.6 _12
Sun JRE (Windows Production Release) 1.6 _10
Sun JRE (Windows Production Release) 1.6 _07
Sun JRE (Windows Production Release) 1.6 _06
Sun JRE (Windows Production Release) 1.6 _05
Sun JRE (Windows Production Release) 1.6 _04
Sun JRE (Windows Production Release) 1.6
Sun JRE (Windows Production Release) 1.6.0_23
Sun JRE (Windows Production Release) 1.6.0_22
Sun JRE (Windows Production Release) 1.6.0_21
Sun JRE (Windows Production Release) 1.6.0_20
Sun JRE (Windows Production Release) 1.6.0_2
Sun JRE (Windows Production Release) 1.6.0_19
Sun JRE (Windows Production Release) 1.6.0_18
Sun JRE (Windows Production Release) 1.6.0_15
Sun JRE (Windows Production Release) 1.6.0_14
Sun JRE (Windows Production Release) 1.6.0_11
Sun JRE (Windows Production Release) 1.6.0_03
Sun JRE (Windows Production Release) 1.6.0_02
Sun JRE (Windows Production Release) 1.6.0_01
Response
Updates are available. Please see the references for more information.
|
WebAttackMaliciousJavaDownloadCVE-2013-0422
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Java Runtime Environment.
Additional Information
Oracle Java Runtime Environment (JRE) is prone to an unspecified remote code execution vulnerability. This issue can be exploited by enticing victims into processing specially HTML document.
An attacker can exploit this issue to execute arbitrary code in the context of the application.
Note: Limited technical details are currently available. We will update this BID as more information emerges.
Oracle JRE 1.7.0 Update 9 and JRE 1.7.0 Update 10 are affected; prior versions may also be vulnerable.
Affected
Oracle JRE 1.7.0 Update 9 and JRE 1.7.0 Update 10 are affected; prior versions may also be vulnerable.
|
WebAttackMaliciousJavaDownloadRequest
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability in JRE Java which may result in remote code execution.
Additional Information
Oracle Java SE is prone to a remote denial-of-service vulnerability in Java Runtime Environment. Specifically, the issue occurs because the application fails to properly check if an array is of an expected Object[] type. An attacker can exploit this issue to cause Java Virtual Machine to crash or bypass Java sandbox restrictions.
An attacker can exploit this issue to cause the application to crash, denying service to legitimate users.
This vulnerability affects the following supported versions:
7 Update 2, 6 Update 30, 5.0 Update 33
Affected
Oracle Java 7 Update 2, 6 Update 30, 5.0 Update 33
Response
Updates are available. Please see the references for more information.
|
WebAttackMaliciousJavaDownloadRequest2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects vulnerability in JRE Java which may result in remote code execution.
Additional Information
Oracle Java SE is prone to a remote denial-of-service vulnerability in Java Runtime Environment. Specifically, the issue occurs because the application fails to properly check if an array is of an expected Object[] type. An attacker can exploit this issue to cause Java Virtual Machine to crash or bypass Java sandbox restrictions.
An attacker can exploit this issue to cause the application to crash, denying service to legitimate users.
This vulnerability affects the following supported versions:
7 Update 2, 6 Update 30, 5.0 Update 33
Affected
Oracle Java 7 Update 2, 6 Update 30, 5.0 Update 33
Response
Updates are available. Please see the references for more information.
|
WebAttackMaliciousJavaFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JAR files
Additional Information
Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine.
Affected
Various Platforms
|
WebAttackMaliciousJavaFileDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download Java Trojan on user's system which can perform various harmful activities.
Additional Information
This signature will detect attempts to download Java Trojan on user's system which can perform various harmful activities.
Affected
Various
|
WebAttackMaliciousJavaFileDownload3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JAR files
Additional Information
Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine.
Affected
Various Platforms
|
WebAttackMaliciousJavaFileDownload4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JAR files
Additional Information
Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine.
Affected
Various Platforms
|
WebAttackMaliciousJavaFileDownload6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JAR files
Additional Information
Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine.
Affected
Various Platforms
|
WebAttackMaliciousJavaFileDownload7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JAR files
Additional Information
Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine.
Affected
Various Platforms
|
WebAttackMaliciousJavaFileDownload8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JAR files
Additional Information
Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine.
Affected
Various Platforms
|
WebAttackMaliciousJavaFileDownload9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JAR files
Additional Information
Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine.
Affected
Various Platforms
|
Web Attack: Malicious Java Payload Download
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
WebAttackMaliciousJavaPayloadDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
WebAttackMaliciousJavaPayloadDownload3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Download 4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload In Request
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload In Request 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload In Request 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload In Request 4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 16
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 17
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 18
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 19
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 20
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 21
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Java Payload Upload 9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
WebAttackMaliciousJavaScriptActivity10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavaScriptDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavaScriptDownload11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavaScriptDownload12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 13
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
Web Attack: Malicious Javascript Download 18
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavaScriptDownload19
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavaScriptDownload20
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
WebAttackMaliciousJavaScriptDownload3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 31
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
WebAttackMaliciousJavaScriptDownload32
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 33
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
WebAttackMaliciousJavaScriptDownload34
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 35
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
WebAttackMaliciousJavaScriptDownload36
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 37
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 38
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 39
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
WebAttackMaliciousJavascriptDownload5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
Web Attack: Malicious JavaScript Download 50
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 51
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 52
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
WebAttackMaliciousJavaScriptDownload53
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
WebAttackMaliciousJavaScriptDownload54
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 55
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 56
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 57
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 58
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
Web Attack: Malicious JavaScript Download 6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious JavaScript downloaded from the websites.
Additional Information
Malicious JavaScript hosted or injected into websites can lead to compromise of the visiting computer.
Affected
Various platforms.
Response
|
WebAttackMaliciousJavaScriptEncoder4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
Web Attack: Malicious Javascript Encoder 5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a web pages associated with malicious, encoded content and result in file downloads to additionally compromise the target host.
Additional Information
This signature detects a web page which is typically associated with malicious content. This content may result in the download of file which may compromise the target host.
Affected
Windows 2000, Windows Server 2003, Windows Vista, Windows XP
Response
1. Update the definitions.
2. Run a full system scan.
3. Delete any values added to the registry.
|
WebAttackMaliciousJavascriptHeapSpray
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature generically detects an attempt to exploit a buffer overflow vulnerability either in a browser or in an ActiveX control.
Additional Information
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application.
Response
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Disable System Restore (Windows Me/XP).
2. Update the virus definitions.
3. Run a full system scan.
|
Web Attack: Malicious Javascript Heap Spray Generic
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature generically detects an attempt to exploit a buffer overflow vulnerability either in a browser or in an ActiveX control.
Additional Information
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application.
Response
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Disable System Restore (Windows Me/XP).
2. Update the virus definitions.
3. Run a full system scan.
|
Web Attack: Malicious Javascript Heap Spray Generic 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature generically detects an attempt to exploit a buffer overflow vulnerability either in a browser or in an ActiveX control.
Additional Information
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application.
Response
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Disable System Restore (Windows Me/XP).
2. Update the virus definitions.
3. Run a full system scan.
|
Web Attack: Malicious Javascript Payload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download various shellcodes, which can used to perform various harmful activities on user's system.
Additional Information
An attacker can use various shellcode to execute arbitrary code with the privileges of the user running the application.
Affected
Various platforms
|
Web Attack: Malicious JavaScript Redirection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavaScriptRedirection2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavaScriptRedirection3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavaScriptRedirection4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavaScriptRedirection6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavaScriptRedirection7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavaScriptRedirection8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
Web Attack: Malicious JavaScript Redirection 9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavascriptRequest
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousJavascriptWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousJavascriptWebsite10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavascriptWebsite13
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempt to download malicious files through HTTP requests.
Additional Information
This signature will detect attempt to download malicious files through HTTP requests.
|
WebAttackMaliciousJavascriptWebsite14
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMaliciousJavascriptWebsite15
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Malicious Javascript Website 16
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMaliciousJavascriptWebsite2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavascriptWebsite21
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMaliciousJavascriptWebsite22
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMaliciousJavascriptWebsite23
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Malicious Javascript Website 24
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMaliciousJavascriptWebsite25
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMaliciousJavascriptWebsite26
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.