text
stringlengths 0
383k
|
---|
WebAttackMaliciousJavascriptWebsite27
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMaliciousJavascriptWebsite3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavascriptWebsite4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
Web Attack: Malicious Javascript Website 41
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Malicious Javascript Website 42
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Malicious Javascript Website 43
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Malicious Javascript Website 44
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Malicious Javascript Website 45
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMaliciousJavascriptWebsite46
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Malicious Javascript Website 47
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Malicious Javascript Website 48
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMaliciousJavascriptWebsite6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavascriptWebsite7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
Web Attack: Malicious Javascript Website 8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJavascriptWebsite9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackMaliciousJNLPFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JNLP files.
Additional Information
JNLP file is a XML file that holds information on how to launch Java Web applications. Parameters such as JAR file location and CLASS file to be executed are found in the JNLP file. Majority of the times exploit kits use these JNLP files to run malicious JAVA files.
Affected
Various Browsers with Java installed.
|
WebAttackMaliciousJPEGImageDownload3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download malicious Images on user's system.
Additional Information
Malicious files can be downloaded on the user's system as image files.
Affected
various
|
WebAttackMaliciousJPEGImageDownloadRequest
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download malicious Images on user's system.
Additional Information
Malicious files can be downloaded on the user's system as image files.
Affected
various
|
WebAttackMaliciousJSDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackMaliciousJSDownload3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackMaliciousJSDownload4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackMaliciousJSDownload5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackMaliciousMalvertismentRedirect4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Nuclear Exploit kit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Nuclear exploit kit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Browsers
|
Web Attack: Malicious Nishang File Download
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download malicious files through HTTP requests.
Additional Information
Attacker uses various mechanisms to target a user system and conduct malicious activity.
Affected
Various platforms.
|
WebAttackMaliciousOfficeFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download malicious files through HTTP requests.
Additional Information
Attacker uses various mechanisms to target a user system and conduct malicious activity.
Affected
Various platforms.
|
Web Attack: Malicious OGNL Expression Upload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious OGNL expressions that can result in remote code execution.
Additional Information
OGNL expression can be used to get or set properties of Java object. OGNL expression can be used maliciously to execute arbitrary code on the target machine.
Affected
Various Apache Struts instances.
Response
|
WebAttackMaliciousPayloadActivity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious payload activity served by penetration testing tools on the infected machine.
Additional Information
Penetration testing tools are software or programs used to assist penetration testing.
Affected
Various operating system platforms.
|
WebAttackMaliciousPayloadActivity4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious payload activity served by penetration testing tools on the infected machine.
Additional Information
Penetration testing tools are software or programs used to assist penetration testing.
Affected
Various operating system platforms.
|
Web Attack: Malicious Payload Activity 6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious payload activity served by penetration testing tools on the infected machine.
Additional Information
Penetration testing tools are software or programs used to assist penetration testing.
Affected
Various operating system platforms.
|
WebAttackMaliciousPayloadDownload11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious payload activity served by penetration testing tools on the infected machine.
Additional Information
Penetration testing tools are software or programs used to assist penetration testing.
Affected
Various operating system platforms.
|
WebAttackMaliciousPayloadDownload13
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious payload activity served by penetration testing tools on the infected machine.
Additional Information
Penetration testing tools are software or programs used to assist penetration testing.
Affected
Various operating system platforms.
|
WebAttackMaliciousPayloadDownload14
Severity:Low
This attack poses a minor threat. Corrective action may not be possible or is not required.
Description
This signature detects Tcp Reverse shell activity
Additional Information
Tcp Reverse Shell is a testing tool to execute the commands from the remote location
Affected
All Windows Platforms
Response
|
WebAttackMaliciousPayloadDownload17
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Download 18
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Download 19
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Download 20
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
WebAttackMaliciousPayloadDownload21
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Download 22
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
WebAttackMaliciousPayloadDownload24
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Download 25
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Download 26
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Download 27
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Download 28
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Download 29
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Download 30
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Download 31
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
WebAttackMaliciousPayloadDownload32
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Download 33
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
WebAttackMaliciousPayloadDownload8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious payload activity served by penetration testing tools on the infected machine.
Additional Information
Penetration testing tools are software or programs used to assist penetration testing.
Affected
Various operating system platforms.
|
Web Attack: Malicious Payload Upload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
WebAttackMaliciousPayloadUpload10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload 11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload 12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload 13
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload 14
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload 15
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload 16
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload 17
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload 5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload 6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload 7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload 9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload Activity 22
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
Web Attack: Malicious Payload Upload Activity 23
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code.
Additional Information
Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code.
Affected
Various platforms.
Response
|
WebAttackMaliciousPDFDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature attempts to detect domains that are serving PDF files with embedded malicious malcode.
Additional Information
These domains are serving malicious PDF files that are attempting to exploit users.
Affected
All Windows
|
WebAttackMaliciousPDFDropper
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to exploit a Buffer Overflow Vulnerability in Foxit Reader.
Additional Information
Foxit Reader is a PDF viewer for Windows.
The application is prone to multiple remote vulnerabilities when it parses PDF files:
1. Specially crafted JBIG2 symbol dictionary segments in a PDF file can dereference uninitialized memory.
2. An 'Open/Execute' action with an overly long filename argument in a PDF file can trigger a stack-based buffer overflow.
3. A security-bypass vulnerability occurs because the application performs actions defined in a PDF file without first presenting the user with a security warning.
Attackers may leverage these issues to execute arbitrary code in the context of the application. Successful exploits may compromise the application and the underlying computer. Failed attacks will cause denial-of-service conditions.
The issues affect Foxit Reader 3.0.2009.1301, 3.0, and 2.3. Other versions may also be affected.
Affected
Foxit Reader
Response
The vendor has released updates. Please see the references for more information.
|
WebAttackMaliciousPDFExploitDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousPDFFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
WebAttackMaliciousPDFFileDownload10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
WebAttackMaliciousPDFFileDownload11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
WebAttackMaliciousPDFFileDownload12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
WebAttackMaliciousPDFFileDownload13
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
WebAttackMaliciousPDFFileDownload14
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
Web Attack: Malicious PDF File Download 15
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
WebAttackMaliciousPDFFileDownload16
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
Web Attack: Malicious PDF File Download 17
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
WebAttackMaliciousPDFFileDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a buffer overflow vulnerability in Nuance PDF Reader.
Additional Information
Nuance PDF Reader is a PDF document handling application for Microsoft Windows.
Nuance PDF Reader is prone to a remote buffer-overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied data. The issue occurs in 'pdfcore8.dll' when processing an excessively long string provided to the 'Launch' action object of the PDF file.
An attacker can exploit this issue by enticing a user to open a malicious PDF file.
Successful exploits may allow the attacker to execute arbitrary code or commands in the context of a user running the affected applications.
Versions prior to Nuance PDF Reader 6.0 (Product ID: PD-1031-001-10472.1) are vulnerable.
Affected
Nuance PDF Reader
|
WebAttackMaliciousPDFFileDownload3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
WebAttackMaliciousPDFFileDownload4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
WebAttackMaliciousPDFFileDownload42
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
WebAttackMaliciousPDFFileDownload5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Nuclear Exploit kit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Nuclear exploit kit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Browsers
|
WebAttackMaliciousPDFFileDownload6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
WebAttackMaliciousPDFFileDownload7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Blackhole toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Blackhole Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Web Browsers
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
|
WebAttackMaliciousPDFFileDownload8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Web Attack: Malicious PDF File Download 9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
WebAttackMaliciousPDFFileDownloadRequest
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Additional Information
This signature will detect attempts to download malicious PDF files which can perform various harmful activities on user's systems.
Affected
Adobe Reader
Response
Ensure all patches have been applied for Adobe Acrobat reader.
|
WebAttackMaliciousPDFFileDownloadRequest3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to exploit a remote code execution vulnerability in Adobe Flash Player.
Additional Information
Adobe Flash Player is a multimedia application for multiple platforms.
Adobe Flash Player is prone to a remote memory-corruption vulnerability. Specifically, the issue is triggered when handling a malicious '.swf' file embedded in a Microsoft Word '.doc', '.pdf' files etc.
An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Affected
Various Adobe Flash Player version
Response
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
|
WebAttackMaliciousPhishingRedirection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingRequest
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousPhishingRequest10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousPhishingRequest11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousPhishingRequest12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousPhishingRequest13
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousPhishingRequest15
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackMaliciousPhishingRequest16
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingRequest17
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingRequest19
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects phishing websites.
Additional Information
Websites can lure the users in attempts to obtain sensitive information like username, password etc which can later be used for malicious purposes.
Affected
Various Platforms.
Response
|
WebAttackMaliciousPhishingRequest2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.