text
stringlengths
0
383k
WebAttackMaliciousWebsiteActivity_43 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
WebAttackMaliciousWebsiteActivity_44 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackMaliciousWebsiteActivity_45 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_46 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_47 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_48 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_49 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_50 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Trojan.Spymel activity on the compromised hosts when it trying to connect back to control server. Additional Information This signature detects Trojan.Spymel activity on the compromised hosts when it trying to connect back to control server. Affected Windows
WebAttackMaliciousWebsiteActivity_69 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Backdoor Trojan activity on the compromised computer. Additional Information Backdoor Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various Windows platforms
WebAttackMaliciousWebsiteActivity_70 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_71 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_72 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Infostealer activity on the infected machine that could result in the downloading and executing of files from the Internet on a compromised host. Additional Information Infostealers are malwares that steals information on the compromised computer and also downloads and executes files from the Internet. Affected Various Windows platforms Response The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines. Disable System Restore (Windows Me/XP). Update the virus definitions. Restart the computer in Safe mode or Safe mode with Command Prompt. Run a full system scan. Delete any values added to the registry.
WebAttackMaliciousWebsiteActivity_73 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature is to detect W97M.Downloader activity. Additional Information W97M.Downloader is a malicious macro that may arrive as a Word document attachment in spam emails. The emails may have different subjects and body messages. For example: Subject: Outstanding invoices - [RANDOM LETTERS] Attachment: In[RANDOM LETTERS].doc Message: Kindly find attached our reminder and copy of the relevant invoices. Looking forward to receive your prompt payment and thank you in advance. Kind regards, [NAME] When the Word document is opened, the macro attempts to download and execute malware from a remote location. Affected Various Windows platforms
WebAttackMaliciousWebsiteActivity_74 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_75 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousWebsiteActivity_78 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Trojan.Mdropper activity on compromised machines. Additional Information Trojan.Mdropper is a type of Trojan whose purpose is to deliver an enclosed payload onto a destination host computer. A dropper is a means to an end rather than the end itself. In other words, the dropper is usually used at the start or in the early stages of a malware attack. Affected Various Windows platform.
WebAttackMaliciousWebsiteActivity_79 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
WebAttackMaliciousWebsiteActivity_81 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Android.Trojan activity in compromised device. Additional Information Android.Trojan is a trojan horse that acts as agent in compromised device that can run several malicious activities and open backdoor to attacker. Affected Android
WebAttackMaliciousWebsiteActivity_82 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects traffic generated by Downloader.Ponik which may lead to further infection of the affected system. Additional Information The Trojan may arrive through spam email. When the Trojan is executed, it may create the following files: %TEMP%\[RANDOM CHARACTERS FILE NAME].bat %UserProfile%\Local Settings\Application Data\pny\pnd.exe The Trojan then creates the following registry entry so that it executes whenever Windows starts: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"Microsoft PnD" = "%UserProfile%\Local Settings\Application Data\pny\pnd.exe" It also creates the following registry entries: HKEY_CURRENT_USER\Software\WinRAR\"Client Hash" = "[RANDOM HEXADECIMAL CHARACTERS]" HKEY_CURRENT_USER\Software\WinRAR\"HWID" = "[RANDOM HEXADECIMAL CHARACTERS]" The Trojan may then connect to any of the following remote locations: 91.231.156.36 [http://]2.enzofavata.com/forum/viewto[REMOVED] [http://]2.sardiniaexport.com/forum/viewto[REMOVED] [http://]222119966122.su/clou[REMOVED] [http://]4.pianetapollo.com/ponyb/gate[REMOVED] [http://]4.professionalsoft.com/ponyb/gate[REMOVED] [http://]6.grapaimport.com/ponyb/gate[REMOVED] [http://]6.grapainterfood.com/ponyb/gate[REMOVED] [http://]atdsupdate.in/all/old[REMOVED] [http://]banderbon.cz.cc/file/local/tool[REMOVED] [http://]bestinsighttours.com/bZ6[REMOVED] [http://]fokanal.cz.cc/gate[REMOVED] [http://]milion8dreams.ru/clou[REMOVED] [http://]mjorart.com/jTc[REMOVED] [http://]powergames.com.pt/KVG[REMOVED] [http://]quranaqiq.com/1kH[REMOVED] [http://]rdquark.com/cAB[REMOVED] [http://]reymontstore.com/jJW5[REMOVED] [http://]staugustineblues.com/n8cZZ[REMOVED] [http://]www.rcrender.com/47NK[REMOVED] [http://]www.westquimica.com/AuNP[REMOVED] onylkp.in weboffice.dyndns-office.com willowcreekcompany.mobi The Trojan may then perform the following actions: Download additional malware Steal passwords Affected Windows
WebAttackMaliciousWebsiteActivity_83 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Backdoor Trojan activity on the compromised computer. Additional Information Backdoor Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various Windows platforms
WebAttackMaliciousWebsiteActivity_85 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files. Additional Information MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files. Affected Windows OS Response
WebAttackMaliciousWebsiteActivity_86 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Backdoor Trojan activity on the compromised computer. Additional Information Backdoor Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various Windows platforms
WebAttackMaliciousWebsiteActivity_87 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_88 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_89 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_90 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Coinminer activity on the infected machine. Additional Information Coinminer is a detection for a file based cryptocurrency miner that runs on your system. These miners consume enormous CPU resources, making computer use sluggish. If you have not installed the program, it might be installed through various malicious sources like bundled in PUA, exploitation, malware, etc. If you receive this signature's alert, it indicates your machine is hosted with Coinminer. Affected Various Operating System platforms
WebAttackMaliciousWebsiteActivity_91 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
WebAttackMaliciousWebsiteActivity_92 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan.Revetrat activity on the compromised computer. Additional Information Trojan.Revetrat is a remote access Trojan that opens a back door on the compromised computer and may download potentially malicious files. Affected Various Windows platforms Response
WebAttackMaliciousWebsiteActivity_93 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan.Revetrat activity on the compromised computer. Additional Information Trojan.Revetrat is a remote access Trojan that opens a back door on the compromised computer and may download potentially malicious files. Affected Various Windows platforms Response
WebAttackMaliciousWebsiteActivity_94 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_95 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit various vulnerabilities in the machine. Additional Information Attackers use various vulnerabilities to exploit the system. This signature detects various exploitation attempts against system. Affected Various platforms, devices. Response
WebAttackMaliciousWebsiteActivity_96 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Ransomware network encryption activity. Additional Information Ransomware encrypts targeted files stored on local and mounted network drives of the compromised machine. Encrypted files are usually appended with suspicious extension such as .locked, .encrypted, .RYK, etc. Once it completes the encryption activity, it then issues a ransom demand in order to restore the encrypted files. Affected Various platforms
WebAttackMaliciousWebsiteActivity_97 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackMaliciousWebsiteActivity_98 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
WebAttackMaliciousWebsiteActivity_99 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description JS.Dosdeming is a detection for a JavaScript used to conduct denial of service attacks. Additional Information JS.Dosdeming is a detection for a JavaScript used to conduct denial of service attacks. Affected Various Windows platforms. Response
WebAttackMaliciousWebsiteRedirect Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect malicious web pages using manual sharing as spreading vector. Additional Information Manual Sharing is a vector used by scammers to spread the scam. The scammers present victims with intriguing videos, fake offers or messages and ask them to share/like the video in order to watch it. Affected Various browsers.
Web Attack: Malicious Website Redirect 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect malicious web pages using manual sharing as spreading vector. Additional Information Manual Sharing is a vector used by scammers to spread the scam. The scammers present victims with intriguing videos, fake offers or messages and ask them to share/like the video in order to watch it. Affected Various browsers.
WebAttackMaliciousWebsiteRedirect3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect malicious web pages using manual sharing as spreading vector. Additional Information Manual Sharing is a vector used by scammers to spread the scam. The scammers present victims with intriguing videos, fake offers or messages and ask them to share/like the video in order to watch it. Affected Various browsers.
WebAttackMaliciousWebsiteRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature prevents access to a host with sufficiently bad reputation as to be auto-blocked. Additional Information This signature prevents access to a host with sufficiently bad reputation as to be auto-blocked. Affected Any software making connections to hosts with poor reputation. Response The request to the server has been blocked; there is no further action required.
Web Attack: Malicious Website Request 10 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects connections to malicious websites associated with malicious browser extension download or activity. Additional Information Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension. Affected Various platforms. Response No additional response is required. If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806 If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
Web Attack: Malicious Website Request 11 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects connections to malicious websites associated with malicious browser extension download or activity. Additional Information Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension. Affected Various platforms. Response No additional response is required. If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806 If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
Web Attack: Malicious Website Request 12 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects connections to malicious websites associated with malicious browser extension download or activity. Additional Information Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension. Affected Various platforms. Response No additional response is required. If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806 If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousWebsiteRequest13 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects connections to malicious websites associated with malicious browser extension download or activity. Additional Information Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension. Affected Various platforms. Response No additional response is required. If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806 If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousWebsiteRequest14 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects connections to malicious websites associated with malicious browser extension download or activity. Additional Information Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension. Affected Various platforms. Response No additional response is required. If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806 If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
Web Attack: Malicious Website Request 15 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects connections to malicious websites associated with malicious browser extension download or activity. Additional Information Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension. Affected Various platforms. Response No additional response is required. If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806 If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousWebsiteRequest2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious activities associated with WP-VCD infection. Additional Information WP-VCD is a malware infection associated with WordPress websites. It spreads itself via nulled plugins and themes distributed by a network of related sites. This infection leads to black hat SEO activity (intended to manipulate search engine results on behalf of attackers) and insertion of malvertising code that creates potentially dangerous redirects and pop-up ads for users viewing a compromised site. Affected WordPress websites
WebAttackMaliciousWebsiteRequest3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious activities associated with WP-VCD infection. Additional Information WP-VCD is a malware infection associated with WordPress websites. It spreads itself via nulled plugins and themes distributed by a network of related sites. This infection leads to black hat SEO activity (intended to manipulate search engine results on behalf of attackers) and insertion of malvertising code that creates potentially dangerous redirects and pop-up ads for users viewing a compromised site. Affected WordPress websites
WebAttackMaliciousWebsiteRequest4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious activities associated with WP-VCD infection. Additional Information WP-VCD is a malware infection associated with WordPress websites. It spreads itself via nulled plugins and themes distributed by a network of related sites. This infection leads to black hat SEO activity (intended to manipulate search engine results on behalf of attackers) and insertion of malvertising code that creates potentially dangerous redirects and pop-up ads for users viewing a compromised site. Affected WordPress websites
WebAttackMaliciousWebsiteRequest5 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects connections to malicious websites associated with malicious browser extension download or activity. Additional Information Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension. Affected Various platforms. Response No additional response is required. If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806 If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousWebsiteRequest6 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects connections to malicious websites associated with malicious browser extension download or activity. Additional Information Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension. Affected Various platforms. Response No additional response is required. If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806 If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
Web Attack: Malicious Website Request 7 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects connections to malicious websites associated with malicious browser extension download or activity. Additional Information Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension. Affected Various platforms. Response No additional response is required. If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806 If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
Web Attack: Malicious Website Request 8 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects connections to malicious websites associated with malicious browser extension download or activity. Additional Information Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension. Affected Various platforms. Response No additional response is required. If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806 If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
Web Attack: Malicious Website Request 9 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects connections to malicious websites associated with malicious browser extension download or activity. Additional Information Malicious browser extensions can steal personal data, redirect to other malicious websites, use system resources to mine cryptocurrency or inject ads into browsing activity. This signature detects activity associated with malicious browser extensions - fake websites tricking users into downloading extension, command and control websites for installed malicious browser extensions, websites containing malicious javascript code injected by malicious extensions etc. This detection can arise in two scenarios - user visiting a website injected with malicious javascript code or user has unknowingly installed a malicious browser extension. Affected Various platforms. Response No additional response is required. If you are a Norton user and wish to exclude the Intrusion Prevention detection, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806 If you are an Enterprise Product user, please go through the exclusion process listed at https://techdocs.broadcom.com/us/en/symantec-security-software/endpoint-security-and-management/endpoint-protection/all/Using-policies-to-manage-security/managing-intrusion-prevention-v36820771-d53e8657/creating-exceptions-for-ips-signatures-v38528395-d53e9744.html to exclude the Intrusion Prevention detection.
WebAttackMaliciousWebsiteScriptRedirect16 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMaliciousWebsiteScriptRedirect17 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMaliciousWebsiteScriptRedirect18 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMaliciousZIPfiledownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects downloading of malicious exploit files contained inside a ZIP file. Additional Information Malicious attackers hide their exploits under legitimate ZIP files and send it to innocent users making them to fall for the exploit. When the file inside the archive is opened the user's machine gets exploited. Affected NA Response NA
WebAttackMaliciousZipFileDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information This signature is designed to prevent access to sites that redirect users or perform actions to trick users into calling the scammer and installing misleading applications such as fake antivirus software. The creators of misleading applications often use web pages with fake antivirus scanners in order to convince users to download and run an executable file. They may also use intermediate sites that redirect users from the site they are visiting to another one offering misleading applications for download. Misleading applications such as fake antivirus scanners ("http://www.symantec.com/security_response/writeup.jsp?docid=2007-101013-3606-99" Trojan.FakeAV ) or bogus disk defragmenters ("http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-112113-1147-99" UltraDefraggerFraud) are designed to mislead users into thinking that their computer has serious problems that must be fixed by paying for a license of the software. For example, a fake antivirus scanner may perform fake scans of the hard disk and then report multiple non-existent threats. To remove the threats, the misleading application tells the user to purchase a license for the software which may amount to anything from forty to one a hundred dollars plus, depending on whether a "support" package is purchased or not. Of course the software and any support packages offered are bogus and will offer no help whatsoever in cleaning up the problem or protecting against any other threats. Newer generations of misleading applications may also cause instability on the computer such as moving files around, hiding them, or preventing access to certain resources. This is done to coerce the user into buying the fake software. Affected Various operating systems Response No further action is required but you may wish to perform some of the following actions as a precautionary measure.
Web Attack: Malicious ZIP File Upload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious ZIP file uploaded to an application server. Additional Information Attackers can upload malicious ZIP files that when processed by a vulnerable application can lead to remote code execution. Affected Various applications. Response
Web Attack : Malvertisement Website Redirect Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
Web Attack : Malvertisement Website Redirect 10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect14 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect15 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect16 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
Web Attack : Malvertisement Website Redirect 17 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect18_1 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect19 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect20 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect21 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect22 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect23 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect25 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
Web Attack : Malvertisement Website Redirect 26 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect27 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
Web Attack : Malvertisement Website Redirect 28 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect29 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
Web Attack : Malvertisement Website Redirect 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect30 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect31 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect32 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
Web Attack : Malvertisement Website Redirect 33 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect34 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
Web Attack : Malvertisement Website Redirect 35 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
Web Attack : Malvertisement Website Redirect 36 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect37 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackMalvertisementWebsiteRedirect7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebAttackMalvertisementWebsiteRedirect8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
Web Attack: Malvertisement Website Redirect 9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious advertisements leading to malware or exploit. Additional Information Website hosts malicious advertisements which when clicked upon drops malicious files and compromise the security of the machine. Affected Various Web Browsers
WebattackMan2web Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description man2web is a Web based application that converts man pages to HTML. It is implemented in CGI. Additional Information man2web is a Web based application that converts man pages to HTML. It is implemented in CGI. man2web is affected by a command execution vulnerability affecting multiple scripts. This issue arises due to insufficient sanitization of user-supplied data. The vulnerability affects the 'man-cgi', 'man2web', and 'man2html' scripts. A remote attacker can supply arbitrary commands to the application through HTTP GET requests that may be executed with the privileges of an affected Web server. This can facilitate a remote compromise. Affected man2web man2web 0.87, 0.88 Response Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]
WebAttackManageEngineMetadataServletCVE-2014-3996 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts of leveraging a SQL injection vulnerability in ManageEngine multiple products which could lead to system compromise. Additional Information ManageEngine multiple products are prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied input submitted to the 'sv' parameter of the 'LinkViewFetchServlet.dat' file. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Affected The following products are affected: ManageEngine Desktop Central 4 through 9 build 90033 ManageEngine Password Manager Pro 5 through 7 build 7002 ManageEngine IT360 8 through 10.1.1 build 10110
Web Attack: ManageEngine OpManager Path Traversal CVE-2023-47211 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit directory traversal vulnerability on the ManageEngine OpManager. Additional Information A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability. Affected ManageEngine OpManager 12.7.258. Response
WebAttackMantisbtImportxmlCVE-2014-7146 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts of leveraging a vulnerability in XmlImportExport plugin for MantisBT which could lead to execute arbitrary PHP code. Additional Information MantisBT is a web-based bug management application implemented in PHP. XmlImportExport plugin for MantisBT is prone to an arbitrary PHP code-execution vulnerability because it fails to properly validate user-supplied input submitted to the 'description' field of the 'ImportXml.php' script. Specifically, this issue affects the 'preg_replace()' function. An attacker can exploit this issue to execute arbitrary PHP code within the context of the web server. Affected MantisBT
Web Attack: Masscan Scanner Request Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Masscan scans on the machine. Additional Information Masscan is a scanning tool that scans and alerts on vulnerabilities found on remote machines. Affected Various Platforms. Response
Web Attack: Mass Iframe Injection Attack Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
WebAttackMassIframeInjectionAttack2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers