text
stringlengths
0
383k
Web Attack: Mass Injection Website 55 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 56 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 57 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite58 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 59 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
WebAttackMassInjectionWebsite60 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite61 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite64 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 65 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 66 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 69 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
Web Attack: Mass Injection Website 70 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite71 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite72 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 74 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 75 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite76 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite77 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite78 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 79 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
Web Attack: Mass Injection Website 80 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 81 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 82 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 83 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 84 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite85 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 86 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 87 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 88 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite89 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
Web Attack: Mass Injection Website 90 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 91 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite92 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 94 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 95 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 96 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassInjectionWebsite97 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 98 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
Web Attack: Mass Injection Website 99 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites. Additional Information This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers Affected Various compromised sites
WebAttackMassSQLInjectionAttack Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description An attacker can perform SQL Injection by manipulating the SQL query logic to carry out unauthorized actions on the underlying database. Additional Information An attacker can perform SQL Injection by manipulating the SQL query logic to carry out unauthorized actions on the underlying database. Affected Various Response Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
WebAttackMassSQLInjectionAttack2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description An attacker can perform SQL Injection by manipulating the SQL query logic to carry out unauthorized actions on the underlying database. Additional Information An attacker can perform SQL Injection by manipulating the SQL query logic to carry out unauthorized actions on the underlying database. Affected Various Response Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
WebAttackMassSQLInjectionAttack4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites. Additional Information Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one. Affected Various browsers
WebAttackMcAfeeVirtualTechnicianActiveXControlInsecureMethod Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an insecure method vulnerability in McAfee Virtual Technician ActiveX control which could result in arbitrary download and execution of malicious files. Additional Information McAfee Virtual Technician is an application that identifies and resolves problems detected during installation of McAfee products. McAfee Virtual Technician ActiveX control is prone to a vulnerability caused by an insecure method. This issue occurs because the 'GetObject()' method of the 'MVT.dll' ActiveX control allows attackers to execute arbitrary objects by supplying ProgID of an arbitrary class from the underlying operating system. The affected ActiveX control identified by CLSID: 2EBE1406-BE0E-44E6-AE10-247A0C5AEDCF Successfully exploiting this issue will allow attackers to execute arbitrary code within the context of the affected application (typically Internet Explorer) that uses the ActiveX control. Affected McAfee Virtual Technician 6.3.0.1911 is vulnerable; other versions may also be affected.
WebAttackMDACRDSDataspaceCodeExecution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability using the RDS.DataSpace Objects. Additional Information Microsoft Data Access Components (MDAC) provide components for database access, including functionality for querying local and remote databases of various formats. The MDAC RDS.Dataspace ActiveX control is prone to a remote code execution vulnerability. This issue exists because the control fails to behave securely when it is hosted on a web page. Sufficient restrictions are not placed on the control to prevent it from performing privileged actions when hosted remotely. An attacker could exploit this issue to install programs, view, modify, or delete data, or create new user accounts on the computer. Affected Hitachi DA Broker for ODBC 01-00, 01-02 Hitachi DBPARTNER ODBC 01-00, 01-03, 01-06, 01-11 Hitachi DBPARTNER2 Client 01-05, 01-12 Hitachi HITSENSER5 01-00, 01-10, 02-80 Microsoft MDAC 2.5 SP3, 2.7, 2.7 SP1, 2.8 Response Workaround: Microsoft has described various workarounds to help prevent exploitation. Please see the referenced security bulletin for more information. Solution: Windows 95/98/ME users should obtain fixes from the Windows Update website. Fixes are available: Microsoft MDAC 2.8.0 SP1: Microsoft Patch Security Update for Windows XP (KB911562) Microsoft Patch Security Update for Microsoft Data Access Components 2.8 Service Pack 1 (KB911562) Microsoft MDAC 2.8.0 SP2: Microsoft Patch Security Update for Windows XP x64 Edition (KB911562) Microsoft Patch Security Update for Windows Server 2003 (KB911562) Microsoft Patch Security Update for Windows Server 2003 for Itanium-based Systems (KB911562) Microsoft Patch Security Update for Windows Server x64 Edition (KB911562) Microsoft MDAC 2.5 SP3: Microsoft Patch Security Update for Microsoft Data Access Components 2.5 Service Pack 3 (KB911562) - English Microsoft MDAC 2.7 SP1: Microsoft Patch Security Update for Windows XP (KB911562) Microsoft Patch Security Update for Microsoft Data Access Components 2.7 Service Pack 1 (KB911562) Microsoft MDAC 2.8 : Microsoft Patch Security Update for Windows Server 2003 (KB911562) Microsoft Patch Security Update for Windows Server 2003 for Itanium-based Systems (KB911562) Microsoft Patch Security Update for Microsoft Data Access Components 2.8 (KB911562)
WebAttackMDACshellQueryCVE-1999-1011 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit MDAC RDS which may result in remote command execution. Additional Information MDAC (Microsoft Data Access Components) is a package used to integrate web and database services. It includes a component named RDS (Remote Data Services). RDS allows remote access via the internet to database objects through IIS. Both are included in a default installation of the Windows NT 4.0 Option Pack, but can be excluded via a custom installation. RDS includes a component called the DataFactory object, which has a vulnerability that could allow any web user to: --Obtain unauthorized access to unpublished files on the IIS server --Use MDAC to tunnel ODBC requests through to a remote internal or external location, thereby obtaining access to non-public servers or effectively masking the source of an attack on another network. The main risk in this vulnerability is the following: --If the Microsoft JET OLE DB Provider or Microsoft DataShape Provider are installed, a user could use the shell() VBA command on the server with System privileges. (See the Microsoft JET Database Engine VBA Vulnerability for more information). These two vulnerabilities combined can allow an attacker on the Internet to run arbitrary commands with System level privileges on the target host. Affected Cisco Building Broadband Service Manager 5.0 Cisco Call Manager 1.0, 2.0, 3.0 Cisco ICS 7750 Cisco IP/VC 3540 Video Rate Matching Module Cisco Unity Server 2.0, 2.2, 2.3, 2.4 Cisco uOne 1.0, 2.0, 3.0, 4.0 Microsoft BackOffice 4.0, 4.5 Microsoft IIS 3.0, 4.0 Microsoft Index Server 2.0 Microsoft MDAC 1.5, 2.0, 2.1 CLEAN, 2.1 UPGRADE Microsoft Site Server Commerce Edition 3.0 i386 Microsoft Windows NT 4.0 Option Pack
WebAttackMediabridgeMedialinkRouterCVE-2015-5995 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a authentication bypass vulnerability in Mediabridge Medialink Wireless-N Broadband router. Additional Information A vulnerability exists in Mediabridge Medialink Wireless-N Broadband router which allows authenticated attacker to craft a cookie to bypass authentication. Affected Mediabridge Medialink Wireless-N Broadband router Response
WebAttackMediawikiThumb.phpCVE-2014-1610 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts of leveraging multiple vulnerabilities in MediaWiki which could leads to arbitrary code execution. Additional Information MediaWiki is a media and image content wiki application. MediaWiki is prone to the following remote code execution vulnerabilities: 1. A remote code-execution vulnerability because of an error related to thumbnail generation. This issue is triggered when processing a specially crafted 'DjVu' file. Note: Successful exploitation of this issue requires 'DjVu' file type upload support to be enabled. 2. A remote code-execution vulnerability because of an error related to thumbnail generation. This issue is triggered when processing a specially crafted 'PDF' file in the 'PdfHandler' extension. Note: Successful exploitation of this issue requires 'PDF' file type upload support to be enabled. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts may result in denial-of-service conditions. Affected Versions prior to 1.22.2, 1.21.5, or 1.19.11 are vulnerable.
WebAttackMediawikiThumb.phpCVE-2014-16102 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts of leveraging multiple vulnerabilities in MediaWiki which could leads to arbitrary code execution. Additional Information MediaWiki is a media and image content wiki application. MediaWiki is prone to the following remote code execution vulnerabilities: 1. A remote code-execution vulnerability because of an error related to thumbnail generation. This issue is triggered when processing a specially crafted 'DjVu' file. Note: Successful exploitation of this issue requires 'DjVu' file type upload support to be enabled. 2. A remote code-execution vulnerability because of an error related to thumbnail generation. This issue is triggered when processing a specially crafted 'PDF' file in the 'PdfHandler' extension. Note: Successful exploitation of this issue requires 'PDF' file type upload support to be enabled. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts may result in denial-of-service conditions. Affected Versions prior to 1.22.2, 1.21.5, or 1.19.11 are vulnerable.
WebAttackMelisPlatformCMSCVE-2022-39297 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Deserialization Remote Code Execution vulnerability on the affected machine. Additional Information Melis Platform MelisCMS is vulnerable to Deserialization Remote Code Execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected MelisCMS prior to version 5.0.0 Response
Web Attack: Memory Heap Spray Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature generically detects an attempt to exploit a buffer overflow vulnerability either in a browser or in an ActiveX control. Additional Information Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application. Response The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines. 1. Disable System Restore (Windows Me/XP). 2. Update the virus definitions. 3. Run a full system scan.
Web Attack: Metabase LFI CVE-2021-41277 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a local file inclusion vulnerability in Metabase platform. Additional Information A vulnerability exists in Metabase platform that can lead to local file inclusion. Affected Versions x.40.0-x.40.4 are affected. Response
Web Attack: Metabase RCE Vulnerability CVE-2023-38646 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Metabase. Additional Information Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. Affected Metabase open source before 0.46.6.1 Metabase Enterprise before 1.46.6.1 Response
WebAttackMetasploitBase64encodedwarpayload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts of posting war payload from Metasploit which could lead to arbitrary code execution. Additional Information Metasploit generates war file, which will carry a common metasploit payload to facilitate further exploitation. Affected vary
WebAttackMetasploitdnaLIMSCommandExecutionAttack Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts by metasploit to upload files into vulnerable applications and servers. Additional Information There exists an file upload vulnerablity in several applications that could result to remote code execution. Affected Multipile
Web Attack: Metasploit JSP Payload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects activity of uploading jsp payload by metasploit. Additional Information Metasploit uploads jsp payload to the affected system. Affected Vary
WebAttackMetasploitLogsignRCEAttack Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts by metasploit to upload files into vulnerable applications and servers. Additional Information There exists an file upload vulnerablity in several applications that could result to remote code execution. Affected Multipile
WebAttackMetasploitPayloadDownloadActivity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects payload activity of metasploit web delivery module. Additional Information The attacker fires up a web server that serves a payload, when an attacker has physical access to the target machine, a simple command can load a waiting payload in a remote server via HTTP. This payload is loaded in memory and does not write to the disk so it potentially evade AV detections. Affected Multipile
WebAttackMetasploitPayloadWebDelivery Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects payload activity of metasploit web delivery module. Additional Information The attacker fires up a web server that serves a payload, when an attacker has physical access to the target machine, a simple command can load a waiting payload in a remote server via HTTP. This payload is loaded in memory and does not write to the disk so it potentially evade AV detections. Affected Multipile
WebAttackMetasploitSilverlightDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution. Additional Information Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications. Silverlight is prone to a remote code-execution vulnerability due to a double dereference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights. Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition. Affected Microsoft Silverlight
WebAttackMetasploitwarpayload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts of posting war payload from Metasploit which could lead to arbitrary code execution. Additional Information Metasploit generates war file, which will carry a common metasploit payload to facilitate further exploitation. Affected vary
Web Attack: Meterpreter Python Payload Download Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Metasploit Meterpreter activity on the compromised machine. Additional Information Meterpreter is one of the advanced payload included with Metasploit framework. It helps establishing a backdoor on the machine through which the attacker can connect and execute commands. Affected Various platforms
WebAttackMHTMLScriptCodeInjectionVulnerability Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detect attempts for malicious execution scripts which may further lead to information disclosure. Additional Information The malicious intent of an attacker could be to use information disclosure by exploiting this vulnerability Affected Various
WebAttackMicrosoftActiveXDataObjectsRCECVE-2019-0888 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft ActiveX Data Objects. Additional Information Microsoft Windows ActiveX Data Objects is prone to a remote code-execution vulnerability because it fails to properly handle objects in memory. An attacker can exploit this issue by enticing a victim to open specially crafted file. An attacker can exploit this issue to execute arbitrary code with elevated privileges. Failed attacks will cause denial of service conditions. Affected Microsoft Windows Server 2019 Microsoft Windows Server 2016 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2012 Microsoft Windows Server 2008 R2 for x64-based Systems SP1 Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1 Microsoft Windows Server 2008 for x64-based Systems SP2 Microsoft Windows Server 2008 for Itanium-based Systems SP2 Microsoft Windows Server 2008 for 32-bit Systems SP2 Microsoft Windows Server 1803 Microsoft Windows Server 1709 Microsoft Windows RT 8.1 Microsoft Windows 8.1 for x64-based Systems Microsoft Windows 8.1 for 32-bit Systems Microsoft Windows 7 for x64-based Systems SP1 Microsoft Windows 7 for 32-bit Systems SP1 Microsoft Windows 10 Version 1903 for x64-based Systems Microsoft Windows 10 Version 1903 for ARM64-based Systems Microsoft Windows 10 Version 1903 for 32-bit Systems Microsoft Windows 10 Version 1809 for x64-based Systems Microsoft Windows 10 Version 1809 for ARM64-based Systems Microsoft Windows 10 Version 1809 for 32-bit Systems Microsoft Windows 10 Version 1803 for x64-based Systems Microsoft Windows 10 Version 1803 for ARM64-based Systems Microsoft Windows 10 Version 1803 for 32-bit Systems Microsoft Windows 10 version 1709 for x64-based Systems Microsoft Windows 10 Version 1709 for ARM64-based Systems Microsoft Windows 10 version 1709 for 32-bit Systems Microsoft Windows 10 version 1703 for x64-based Systems Microsoft Windows 10 version 1703 for 32-bit Systems Microsoft Windows 10 Version 1607 for x64-based Systems Microsoft Windows 10 Version 1607 for 32-bit Systems Microsoft Windows 10 for x64-based Systems Microsoft Windows 10 for 32-bit Systems
WebAttackMicrosoftChakraScriptEngineCVE-2019-0539 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the scripting engine fails to properly handle objects in memory in Microsoft Edge. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Edge for Microsoft Windows 10 and Server 2016.
WebAttackMicrosoftCommonControlsCVE-2012-0158 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Windows Common Controls. Additional Information Microsoft Windows Common Control Library is used by Windows Explorer to create controls such as list view, header, tree tip, tooltip, tool bar, status bar, etc. The application is prone to a remote code-execution vulnerability. Specifically, this issue affects 'MSCOMCTL.TreeView', 'MSCOMCTL.ListView2', 'MSCOMCTL.TreeView2', and 'MSCOMCTL.ListView' ActiveX controls contained in the 'MSCOMCTL.OCX' file. The controls are identified by the following CLSIDs: bdd1f04b-858b-11d1-b16a-00c0f0283628 996BF5E0-8044-4650-ADEB-0B013914E99C C74190B6-8589-11d1-B16A-00C0F0283628 9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code within the context of the application (typically Internet Explorer) that uses the ActiveX control. Affected Microsoft Visual FoxPro 9.0 SP2 Microsoft Visual FoxPro 9.0 SP1 Microsoft Visual FoxPro 8.0 SP1 Microsoft Visual FoxPro 8.0 Microsoft Visual Basic 6.0 - Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0 Microsoft SQL Server 2008 x64 SP3 Microsoft SQL Server 2008 x64 SP2 Microsoft SQL Server 2008 itanium SP3 Microsoft SQL Server 2008 itanium SP2 Microsoft SQL Server 2008 itanium SP1 Microsoft SQL Server 2008 itanium R2 Microsoft SQL Server 2008 32-bit SP3 Microsoft SQL Server 2008 32-bit SP2 Microsoft SQL Server 2008 32-bit R2 Microsoft SQL Server 2008 R2 SP1 Microsoft SQL Server 2008 R2 Microsoft SQL Server 2008 0 Microsoft SQL Server 2005 x64 Edition SP4 Microsoft SQL Server 2005 x64 Edition SP3 Microsoft SQL Server 2005 x64 Edition SP2 Microsoft SQL Server 2005 x64 Edition SP1 Microsoft SQL Server 2005 Itanium Edition SP4 Microsoft SQL Server 2005 Itanium Edition SP3 Microsoft SQL Server 2005 Itanium Edition SP2 Microsoft SQL Server 2005 Itanium Edition SP1 Microsoft SQL Server 2005 Itanium Edition 0 Microsoft SQL Server 2005 Express Edition SP4 Microsoft SQL Server 2005 Express Edition SP3 Microsoft SQL Server 2005 Express Edition SP2 Microsoft SQL Server 2005 Express Edition SP1 Microsoft SQL Server 2000 SP4 Microsoft SQL Server 2000 SP3 Microsoft SQL Server 2000 SP2 Microsoft SQL Server 2000 SP1 - Microsoft Windows 2000 Professional SP2 - Microsoft Windows 2000 Professional SP1 - Microsoft Windows 2000 Professional - Microsoft Windows NT 4.0 SP6a - Microsoft Windows NT 4.0 SP6 - Microsoft Windows NT 4.0 SP5 Microsoft SQL Server 2000 - Microsoft Windows 2000 Professional SP2 - Microsoft Windows 2000 Professional SP1 - Microsoft Windows 2000 Professional - Microsoft Windows NT 4.0 SP6a - Microsoft Windows NT 4.0 SP6 - Microsoft Windows NT 4.0 SP5 - Microsoft Windows NT 4.0 Microsoft Office 2010 (32-bit edition) 0 Microsoft Office 2010 0 Microsoft Office 2010 (32-bit edition) SP1 Microsoft Office 2007 SP2 Microsoft Office 2007 SP1 Microsoft Office 2003 Web Components SP3 Microsoft Office 2003 SP3 Microsoft Office 2003 SP2 Microsoft Office 2003 SP1 Microsoft Commerce Server 2009 R2 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2009 0 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 SP2 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 SP1 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 0 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2002 SP4 Microsoft Commerce Server 2002 SP3 Microsoft Commerce Server 2002 SP2 Microsoft Commerce Server 2002 SP1 Microsoft BizTalk Server 2002 SP1 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Advanced Server SP1 - Microsoft Windows 2000 Advanced Server - Microsoft Windows 2000 Server SP2 - Microsoft Windows 2000 Server SP1 - Microsoft Windows 2000 Server
WebAttackMicrosoftCommonControlsCVE-2012-01582 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Windows Common Controls. Additional Information Microsoft Windows Common Control Library is used by Windows Explorer to create controls such as list view, header, tree tip, tooltip, tool bar, status bar, etc. The application is prone to a remote code-execution vulnerability. Specifically, this issue affects 'MSCOMCTL.TreeView', 'MSCOMCTL.ListView2', 'MSCOMCTL.TreeView2', and 'MSCOMCTL.ListView' ActiveX controls contained in the 'MSCOMCTL.OCX' file. The controls are identified by the following CLSIDs: bdd1f04b-858b-11d1-b16a-00c0f0283628 996BF5E0-8044-4650-ADEB-0B013914E99C C74190B6-8589-11d1-B16A-00C0F0283628 9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code within the context of the application (typically Internet Explorer) that uses the ActiveX control. Affected Microsoft Visual FoxPro 9.0 SP2 Microsoft Visual FoxPro 9.0 SP1 Microsoft Visual FoxPro 8.0 SP1 Microsoft Visual FoxPro 8.0 Microsoft Visual Basic 6.0 - Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0 Microsoft SQL Server 2008 x64 SP3 Microsoft SQL Server 2008 x64 SP2 Microsoft SQL Server 2008 itanium SP3 Microsoft SQL Server 2008 itanium SP2 Microsoft SQL Server 2008 itanium SP1 Microsoft SQL Server 2008 itanium R2 Microsoft SQL Server 2008 32-bit SP3 Microsoft SQL Server 2008 32-bit SP2 Microsoft SQL Server 2008 32-bit R2 Microsoft SQL Server 2008 R2 SP1 Microsoft SQL Server 2008 R2 Microsoft SQL Server 2008 0 Microsoft SQL Server 2005 x64 Edition SP4 Microsoft SQL Server 2005 x64 Edition SP3 Microsoft SQL Server 2005 x64 Edition SP2 Microsoft SQL Server 2005 x64 Edition SP1 Microsoft SQL Server 2005 Itanium Edition SP4 Microsoft SQL Server 2005 Itanium Edition SP3 Microsoft SQL Server 2005 Itanium Edition SP2 Microsoft SQL Server 2005 Itanium Edition SP1 Microsoft SQL Server 2005 Itanium Edition 0 Microsoft SQL Server 2005 Express Edition SP4 Microsoft SQL Server 2005 Express Edition SP3 Microsoft SQL Server 2005 Express Edition SP2 Microsoft SQL Server 2005 Express Edition SP1 Microsoft SQL Server 2000 SP4 Microsoft SQL Server 2000 SP3 Microsoft SQL Server 2000 SP2 Microsoft SQL Server 2000 SP1 - Microsoft Windows 2000 Professional SP2 - Microsoft Windows 2000 Professional SP1 - Microsoft Windows 2000 Professional - Microsoft Windows NT 4.0 SP6a - Microsoft Windows NT 4.0 SP6 - Microsoft Windows NT 4.0 SP5 Microsoft SQL Server 2000 - Microsoft Windows 2000 Professional SP2 - Microsoft Windows 2000 Professional SP1 - Microsoft Windows 2000 Professional - Microsoft Windows NT 4.0 SP6a - Microsoft Windows NT 4.0 SP6 - Microsoft Windows NT 4.0 SP5 - Microsoft Windows NT 4.0 Microsoft Office 2010 (32-bit edition) 0 Microsoft Office 2010 0 Microsoft Office 2010 (32-bit edition) SP1 Microsoft Office 2007 SP2 Microsoft Office 2007 SP1 Microsoft Office 2003 Web Components SP3 Microsoft Office 2003 SP3 Microsoft Office 2003 SP2 Microsoft Office 2003 SP1 Microsoft Commerce Server 2009 R2 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2009 0 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 SP2 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 SP1 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 0 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2002 SP4 Microsoft Commerce Server 2002 SP3 Microsoft Commerce Server 2002 SP2 Microsoft Commerce Server 2002 SP1 Microsoft BizTalk Server 2002 SP1 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Advanced Server SP1 - Microsoft Windows 2000 Advanced Server - Microsoft Windows 2000 Server SP2 - Microsoft Windows 2000 Server SP1 - Microsoft Windows 2000 Server
WebAttackMicrosoftCommonControlsCVE-2012-01583 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Windows Common Controls. Additional Information Microsoft Windows Common Control Library is used by Windows Explorer to create controls such as list view, header, tree tip, tooltip, tool bar, status bar, etc. The application is prone to a remote code-execution vulnerability. Specifically, this issue affects 'MSCOMCTL.TreeView', 'MSCOMCTL.ListView2', 'MSCOMCTL.TreeView2', and 'MSCOMCTL.ListView' ActiveX controls contained in the 'MSCOMCTL.OCX' file. The controls are identified by the following CLSIDs: bdd1f04b-858b-11d1-b16a-00c0f0283628 996BF5E0-8044-4650-ADEB-0B013914E99C C74190B6-8589-11d1-B16A-00C0F0283628 9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code within the context of the application (typically Internet Explorer) that uses the ActiveX control. Affected Microsoft Visual FoxPro 9.0 SP2 Microsoft Visual FoxPro 9.0 SP1 Microsoft Visual FoxPro 8.0 SP1 Microsoft Visual FoxPro 8.0 Microsoft Visual Basic 6.0 - Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0 Microsoft SQL Server 2008 x64 SP3 Microsoft SQL Server 2008 x64 SP2 Microsoft SQL Server 2008 itanium SP3 Microsoft SQL Server 2008 itanium SP2 Microsoft SQL Server 2008 itanium SP1 Microsoft SQL Server 2008 itanium R2 Microsoft SQL Server 2008 32-bit SP3 Microsoft SQL Server 2008 32-bit SP2 Microsoft SQL Server 2008 32-bit R2 Microsoft SQL Server 2008 R2 SP1 Microsoft SQL Server 2008 R2 Microsoft SQL Server 2008 0 Microsoft SQL Server 2005 x64 Edition SP4 Microsoft SQL Server 2005 x64 Edition SP3 Microsoft SQL Server 2005 x64 Edition SP2 Microsoft SQL Server 2005 x64 Edition SP1 Microsoft SQL Server 2005 Itanium Edition SP4 Microsoft SQL Server 2005 Itanium Edition SP3 Microsoft SQL Server 2005 Itanium Edition SP2 Microsoft SQL Server 2005 Itanium Edition SP1 Microsoft SQL Server 2005 Itanium Edition 0 Microsoft SQL Server 2005 Express Edition SP4 Microsoft SQL Server 2005 Express Edition SP3 Microsoft SQL Server 2005 Express Edition SP2 Microsoft SQL Server 2005 Express Edition SP1 Microsoft SQL Server 2000 SP4 Microsoft SQL Server 2000 SP3 Microsoft SQL Server 2000 SP2 Microsoft SQL Server 2000 SP1 - Microsoft Windows 2000 Professional SP2 - Microsoft Windows 2000 Professional SP1 - Microsoft Windows 2000 Professional - Microsoft Windows NT 4.0 SP6a - Microsoft Windows NT 4.0 SP6 - Microsoft Windows NT 4.0 SP5 Microsoft SQL Server 2000 - Microsoft Windows 2000 Professional SP2 - Microsoft Windows 2000 Professional SP1 - Microsoft Windows 2000 Professional - Microsoft Windows NT 4.0 SP6a - Microsoft Windows NT 4.0 SP6 - Microsoft Windows NT 4.0 SP5 - Microsoft Windows NT 4.0 Microsoft Office 2010 (32-bit edition) 0 Microsoft Office 2010 0 Microsoft Office 2010 (32-bit edition) SP1 Microsoft Office 2007 SP2 Microsoft Office 2007 SP1 Microsoft Office 2003 Web Components SP3 Microsoft Office 2003 SP3 Microsoft Office 2003 SP2 Microsoft Office 2003 SP1 Microsoft Commerce Server 2009 R2 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2009 0 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 SP2 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 SP1 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 0 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2002 SP4 Microsoft Commerce Server 2002 SP3 Microsoft Commerce Server 2002 SP2 Microsoft Commerce Server 2002 SP1 Microsoft BizTalk Server 2002 SP1 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Advanced Server SP1 - Microsoft Windows 2000 Advanced Server - Microsoft Windows 2000 Server SP2 - Microsoft Windows 2000 Server SP1 - Microsoft Windows 2000 Server
WebAttackMicrosoftCommonControlsCVE-2012-01584 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Windows Common Controls. Additional Information Microsoft Windows Common Control Library is used by Windows Explorer to create controls such as list view, header, tree tip, tooltip, tool bar, status bar, etc. The application is prone to a remote code-execution vulnerability. Specifically, this issue affects 'MSCOMCTL.TreeView', 'MSCOMCTL.ListView2', 'MSCOMCTL.TreeView2', and 'MSCOMCTL.ListView' ActiveX controls contained in the 'MSCOMCTL.OCX' file. The controls are identified by the following CLSIDs: bdd1f04b-858b-11d1-b16a-00c0f0283628 996BF5E0-8044-4650-ADEB-0B013914E99C C74190B6-8589-11d1-B16A-00C0F0283628 9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code within the context of the application (typically Internet Explorer) that uses the ActiveX control. Affected Microsoft Visual FoxPro 9.0 SP2 Microsoft Visual FoxPro 9.0 SP1 Microsoft Visual FoxPro 8.0 SP1 Microsoft Visual FoxPro 8.0 Microsoft Visual Basic 6.0 - Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0 Microsoft SQL Server 2008 x64 SP3 Microsoft SQL Server 2008 x64 SP2 Microsoft SQL Server 2008 itanium SP3 Microsoft SQL Server 2008 itanium SP2 Microsoft SQL Server 2008 itanium SP1 Microsoft SQL Server 2008 itanium R2 Microsoft SQL Server 2008 32-bit SP3 Microsoft SQL Server 2008 32-bit SP2 Microsoft SQL Server 2008 32-bit R2 Microsoft SQL Server 2008 R2 SP1 Microsoft SQL Server 2008 R2 Microsoft SQL Server 2008 0 Microsoft SQL Server 2005 x64 Edition SP4 Microsoft SQL Server 2005 x64 Edition SP3 Microsoft SQL Server 2005 x64 Edition SP2 Microsoft SQL Server 2005 x64 Edition SP1 Microsoft SQL Server 2005 Itanium Edition SP4 Microsoft SQL Server 2005 Itanium Edition SP3 Microsoft SQL Server 2005 Itanium Edition SP2 Microsoft SQL Server 2005 Itanium Edition SP1 Microsoft SQL Server 2005 Itanium Edition 0 Microsoft SQL Server 2005 Express Edition SP4 Microsoft SQL Server 2005 Express Edition SP3 Microsoft SQL Server 2005 Express Edition SP2 Microsoft SQL Server 2005 Express Edition SP1 Microsoft SQL Server 2000 SP4 Microsoft SQL Server 2000 SP3 Microsoft SQL Server 2000 SP2 Microsoft SQL Server 2000 SP1 - Microsoft Windows 2000 Professional SP2 - Microsoft Windows 2000 Professional SP1 - Microsoft Windows 2000 Professional - Microsoft Windows NT 4.0 SP6a - Microsoft Windows NT 4.0 SP6 - Microsoft Windows NT 4.0 SP5 Microsoft SQL Server 2000 - Microsoft Windows 2000 Professional SP2 - Microsoft Windows 2000 Professional SP1 - Microsoft Windows 2000 Professional - Microsoft Windows NT 4.0 SP6a - Microsoft Windows NT 4.0 SP6 - Microsoft Windows NT 4.0 SP5 - Microsoft Windows NT 4.0 Microsoft Office 2010 (32-bit edition) 0 Microsoft Office 2010 0 Microsoft Office 2010 (32-bit edition) SP1 Microsoft Office 2007 SP2 Microsoft Office 2007 SP1 Microsoft Office 2003 Web Components SP3 Microsoft Office 2003 SP3 Microsoft Office 2003 SP2 Microsoft Office 2003 SP1 Microsoft Commerce Server 2009 R2 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2009 0 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 SP2 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 SP1 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 0 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2002 SP4 Microsoft Commerce Server 2002 SP3 Microsoft Commerce Server 2002 SP2 Microsoft Commerce Server 2002 SP1 Microsoft BizTalk Server 2002 SP1 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Advanced Server SP1 - Microsoft Windows 2000 Advanced Server - Microsoft Windows 2000 Server SP2 - Microsoft Windows 2000 Server SP1 - Microsoft Windows 2000 Server
Web Attack: Microsoft Defender CVE-2021-42298 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Remote Code Execution vulnerability on the affected machine. Additional Information Microsoft Defender is vulnerable to Remote Code Execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected Various Windows machines. Response
WebAttackMicrosoftDirectPlayCVE-2012-1537 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in DirectPlay DirectX library. Additional Information A vulnerability in the DirectPlay component of the DirectX library on Windows can result in remote code execution. Affected Various Microsoft Windows Platforms
WebAttackMicrosoftDirectXWAVandAVIFileParsingRemoteCodeExecutionCVE-2007-3895 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a vulnerability in Microsoft DirectShow when opening a maliciously crafted file which could result in remote code execution. Additional Information Microsoft DirectX is a component for Microsoft Windows. Microsoft DirectShow is an integrated component for DirectX that allows users to stream media. DirectX is prone to a remote code-execution vulnerability. This issue occurs when Microsoft DirectShow fails to perform sufficient validation of WAV and AVI file parameters. An attacker could exploit this issue by enticing an unsuspecting victim to open a malicious WAV or AVI file. Successfully exploiting this issue will allow the attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will crash the application. Affected Avaya Messaging Application Server MM 1.1, MM 2.0, MM 3.0, MM 3.1 HP Storage Management Appliance 2.1, I, II, III Microsoft DirectX 7.0, 8.1, 9.0 c, 10.0 Nortel Networks CallPilot 1002rp, 200i, 201i, 702t, 703t Nortel Networks Centrex IP Client Manager 10.0, 9.0 Response Microsoft has released updates and an advisory to address this issue. Please see the references for more information.
WebAttackMicrosoftDNSListDrive-ByDownloadActivity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempts of Microsoft DNSList utility performing Drive-By download downloading malicious payload. Additional Information DNSLint is a Microsoft Windows CL utility that helps you to diagnose common DNS name resolution issues. The tool doesn't verify domain names when parsing DNS text-files using the "/ql" switch making it prone to forced drive-by downloads, providing an end user is tricked into using a server text-file containing a script/binary reference instead of a normally expected domain name. Affected Microsoft Windows with DNSList installed. Response
WebAttackMicrosoftDotNetFrameworkRCECVE-2020-0646 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft .NET framework. Additional Information Microsoft .NET Framework is prone to a remote code-execution vulnerability because it fails to properly validate the input. An attacker can exploit this issue by sending specially crafted inputs to the affected application utilizing susceptible .Net methods. An attacker can leverage this issue to execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely result in denial of service conditions. Affected Microsoft .NET Framework.
WebAttackMicrosoftDynamicsCRMXSS Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a cross site scripting vulnerability in Microsoft Dynamics CRM. Additional Information A flaw exists in Microsoft Dynamics CRM that can allow attackers to perform Cross Site Scripting Attacks. The specific vulnerability exists in the 'SyncFilterPage.aspx' which doesn't validate the inputs properly. Affected Microsoft Dynamics CRM Response
WebAttackMicrosoftEdgeACGBypassDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to bypass certain Microsoft Edge security restrictions and perform unauthorized actions. Additional Information Microsoft Edge is prone to a security-bypass vulnerability because it fails to properly handles requests of different origins. An attacker can exploit this issue to bypass AC using 'UnmapViewOfFile()' function. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Affected Microsoft Edge
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-0989 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected ChakraCore and Microsoft Edge
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-0993 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected ChakraCore and Microsoft Edge.
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-1003 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected ChakraCore and Microsoft Edge.
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-1024 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected ChakraCore and Microsoft Edge.
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-1052 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected ChakraCore and Microsoft Edge.
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-1103 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Edge Windows 10, Server 2016, and Server 2019
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-1106 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Edge Windows 10, Server 2016, and Server 2019
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-1107 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Edge Windows 10, Server 2016, and Server 2019
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-1196 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Edge Windows 10 and Server 2019 Response
WebAttackMicrosoftEdgeCVE-2016-3294 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to execute arbitrary code in the context of the currently logged-in user. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability because it improperly accesses objects in memory. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. This allows the attacker to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Edge
WebAttackMicrosoftEdgeCVE-2016-3377 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Successful exploits will allow attackers to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Microsoft Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra JavaScript engine fails to properly handle objects in memory during rendering process. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Edge
WebAttackMicrosoftEdgeCVE-2016-7200 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra JavaScript engines fail to properly handle objects in memory during the rendering process. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. This could allow the attacker to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Multiple version of Edge.
WebAttackMicrosoftEdgeCVE-2017-11845 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability because it fails to properly access objects in memory. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected multiple versions of Edge.
WebAttackMicrosoftEdgeCVE-2017-8734 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote memory corruption vulnerability in Microsoft Edge. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability because it fails to properly access objects in memory. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Edge 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 Version 1607 for 32-bit Systems 0 + Microsoft Windows 10 Version 1607 for x64-based Systems 0 + Microsoft Windows Server 2016 for x64-based Systems 0
WebAttackMicrosoftEdgeCVE-2017-8757 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Edge. Additional Information Microsoft Edge is a web browser available for Microsoft Windows. Microsoft Edge is prone to a remote code-execution vulnerability because it fail to properly handle objects in memory. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Edge 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 Version 1607 for 32-bit Systems 0 + Microsoft Windows 10 Version 1607 for x64-based Systems 0 + Microsoft Windows Server 2016 for x64-based Systems 0
WebAttackMicrosoftEdgeCVE-2018-8179 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because it fails to properly handle objects in memory. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. This could allow the attacker to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Edge supported products.
WebAttackMicrosoftEdgeCVE-2018-8456 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Microsoft ChakraCore Scripting Engine is prone to a remote memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Chakra is a JavaScript engine developed by Microsoft for its Microsoft Edge web browser. ChakraCore is the core part of Chakra JavaScript engine. Microsoft ChakraCore Scripting Engine is prone to a remote memory-corruption vulnerability because it fails to properly handle objects in memory. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft ChakraCore Microsoft Edge Response Updates are available. Please see the references or vendor advisory for more information.
WebAttackMicrosoftEdgeCVE-2018-8463Activity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the affected device. Additional Information Microsoft Edge is a web browser available for Microsoft Windows. Microsoft Edge is prone to a remote privilege-escalation vulnerability. Specifically, this issue occurs because of an error in the implementation of sandbox. An attacker can exploit this issue to escape from the AppContainer sandbox in the browser. An attacker can exploit this issue to gain elevated privileges. Affected Microsoft Edge
WebAttackMicrosoftEdgeCVE-2018-8469 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to to gain elevated privileges on vulnerable Microsoft Edge. Additional Information Microsoft Edge is a web browser available for Microsoft Windows. Microsoft Edge is prone to a remote privilege-escalation vulnerability. Specifically, this issue occurs because of an error in the implementation of sandbox. An attacker can exploit this issue to escape from the AppContainer sandbox in the browser. An attacker can exploit this issue to gain elevated privileges. Affected Various version of Microsoft Edge on Windows 10 and Windows Server 2016.
WebAttackMicrosoftEdgeCVE-2019-0810Activity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability because it fails to properly handle objects in memory. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Various versions of Microsoft Edge
WebAttackMicrosoftEdgeCVE-2019-0812 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability because it fails to properly handle objects in memory. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Various version of Microsoft Edge on Windows 10, Windows Server 2016, and Windows Server 2019.