text
stringlengths 0
383k
|
---|
Web Attack: Mass Injection Website 55
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 56
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 57
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite58
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 59
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
WebAttackMassInjectionWebsite60
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite61
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite64
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 65
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 66
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 69
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
Web Attack: Mass Injection Website 70
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite71
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite72
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 74
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 75
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite76
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite77
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite78
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 79
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
Web Attack: Mass Injection Website 80
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 81
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 82
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 83
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 84
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite85
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 86
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 87
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 88
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite89
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
Web Attack: Mass Injection Website 90
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 91
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite92
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 94
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 95
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 96
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassInjectionWebsite97
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 98
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
Web Attack: Mass Injection Website 99
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden scripts injected in compromised websites, which upon visiting redirects the user to malicious websites.
Additional Information
This is a detection for compromised websites with the injected script code. This is an attack where a malicious javascript is injected in large number of clean websites. Once compromised, it aims to use the websites to redirect its visitors to malicious websites without visitors being aware of it. The malicious javascript can also perform other unwanted activities like stealing payment information from payment pages on ecommerce websites. This is known as Formjacking, which is described here- https://www.symantec.com/blogs/threat-intelligence/formjacking-attacks-retailers
Affected
Various compromised sites
|
WebAttackMassSQLInjectionAttack
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
An attacker can perform SQL Injection by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.
Additional Information
An attacker can perform SQL Injection by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.
Affected
Various
Response
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
|
WebAttackMassSQLInjectionAttack2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
An attacker can perform SQL Injection by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.
Additional Information
An attacker can perform SQL Injection by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.
Affected
Various
Response
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
|
WebAttackMassSQLInjectionAttack4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframe injected in websites, which upon visiting redirects the user to exploit kit hosted sites.
Additional Information
Attackers inject iframes into website that redirect users to exploit kit hosted sites when visited. These exploit kit sites hosts several different exploits that exploit different client-side vulnerabilities one by one.
Affected
Various browsers
|
WebAttackMcAfeeVirtualTechnicianActiveXControlInsecureMethod
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit an insecure method vulnerability in McAfee Virtual Technician ActiveX control which could result in arbitrary download and execution of malicious files.
Additional Information
McAfee Virtual Technician is an application that identifies and resolves problems detected during installation of McAfee products.
McAfee Virtual Technician ActiveX control is prone to a vulnerability caused by an insecure method. This issue occurs because the 'GetObject()' method of the 'MVT.dll' ActiveX control allows attackers to execute arbitrary objects by supplying ProgID of an arbitrary class from the underlying operating system. The affected ActiveX control identified by CLSID:
2EBE1406-BE0E-44E6-AE10-247A0C5AEDCF
Successfully exploiting this issue will allow attackers to execute arbitrary code within the context of the affected application (typically Internet Explorer) that uses the ActiveX control.
Affected
McAfee Virtual Technician 6.3.0.1911 is vulnerable; other versions may also be affected.
|
WebAttackMDACRDSDataspaceCodeExecution
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability using the RDS.DataSpace Objects.
Additional Information
Microsoft Data Access Components (MDAC) provide components for database access, including functionality for querying local and remote databases of various formats.
The MDAC RDS.Dataspace ActiveX control is prone to a remote code execution vulnerability. This issue exists because the control fails to behave securely when it is hosted on a web page. Sufficient restrictions are not placed on the control to prevent it from performing privileged actions when hosted remotely.
An attacker could exploit this issue to install programs, view, modify, or delete data, or create new user accounts on the computer.
Affected
Hitachi DA Broker for ODBC 01-00, 01-02
Hitachi DBPARTNER ODBC 01-00, 01-03, 01-06, 01-11
Hitachi DBPARTNER2 Client 01-05, 01-12
Hitachi HITSENSER5 01-00, 01-10, 02-80
Microsoft MDAC 2.5 SP3, 2.7, 2.7 SP1, 2.8
Response
Workaround:
Microsoft has described various workarounds to help prevent exploitation. Please see the referenced security bulletin for more information.
Solution:
Windows 95/98/ME users should obtain fixes from the Windows Update website.
Fixes are available:
Microsoft MDAC 2.8.0 SP1:
Microsoft Patch Security Update for Windows XP (KB911562)
Microsoft Patch Security Update for Microsoft Data Access Components 2.8 Service Pack 1 (KB911562)
Microsoft MDAC 2.8.0 SP2:
Microsoft Patch Security Update for Windows XP x64 Edition (KB911562)
Microsoft Patch Security Update for Windows Server 2003 (KB911562)
Microsoft Patch Security Update for Windows Server 2003 for Itanium-based Systems (KB911562)
Microsoft Patch Security Update for Windows Server x64 Edition (KB911562)
Microsoft MDAC 2.5 SP3:
Microsoft Patch Security Update for Microsoft Data Access Components 2.5 Service Pack 3 (KB911562) - English
Microsoft MDAC 2.7 SP1:
Microsoft Patch Security Update for Windows XP (KB911562)
Microsoft Patch Security Update for Microsoft Data Access Components 2.7 Service Pack 1 (KB911562)
Microsoft MDAC 2.8 :
Microsoft Patch Security Update for Windows Server 2003 (KB911562)
Microsoft Patch Security Update for Windows Server 2003 for Itanium-based Systems (KB911562)
Microsoft Patch Security Update for Microsoft Data Access Components 2.8 (KB911562)
|
WebAttackMDACshellQueryCVE-1999-1011
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit MDAC RDS which may result in remote command execution.
Additional Information
MDAC (Microsoft Data Access Components) is a package used to integrate web and database services. It includes a component named RDS (Remote Data Services). RDS allows remote access via the internet to database objects through IIS. Both are included in a default installation of the Windows NT 4.0 Option Pack, but can be excluded via a custom installation.
RDS includes a component called the DataFactory object, which has a vulnerability that could allow any web user to:
--Obtain unauthorized access to unpublished files on the IIS server
--Use MDAC to tunnel ODBC requests through to a remote internal or external location, thereby obtaining access to non-public servers or effectively masking the source of an attack on another network.
The main risk in this vulnerability is the following:
--If the Microsoft JET OLE DB Provider or Microsoft DataShape Provider are installed, a user could use the shell() VBA command on the server with System privileges. (See the Microsoft JET Database Engine VBA Vulnerability for more information). These two vulnerabilities combined can allow an attacker on the Internet to run arbitrary commands with System level privileges on the target host.
Affected
Cisco Building Broadband Service Manager 5.0
Cisco Call Manager 1.0, 2.0, 3.0
Cisco ICS 7750
Cisco IP/VC 3540 Video Rate Matching Module
Cisco Unity Server 2.0, 2.2, 2.3, 2.4
Cisco uOne 1.0, 2.0, 3.0, 4.0
Microsoft BackOffice 4.0, 4.5
Microsoft IIS 3.0, 4.0
Microsoft Index Server 2.0
Microsoft MDAC 1.5, 2.0, 2.1 CLEAN, 2.1 UPGRADE
Microsoft Site Server Commerce Edition 3.0 i386
Microsoft Windows NT 4.0 Option Pack
|
WebAttackMediabridgeMedialinkRouterCVE-2015-5995
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a authentication bypass vulnerability in Mediabridge Medialink Wireless-N Broadband router.
Additional Information
A vulnerability exists in Mediabridge Medialink Wireless-N Broadband router which allows authenticated attacker to craft a cookie to bypass authentication.
Affected
Mediabridge Medialink Wireless-N Broadband router
Response
|
WebAttackMediawikiThumb.phpCVE-2014-1610
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts of leveraging multiple vulnerabilities in MediaWiki which could leads to arbitrary code execution.
Additional Information
MediaWiki is a media and image content wiki application.
MediaWiki is prone to the following remote code execution vulnerabilities:
1. A remote code-execution vulnerability because of an error related to thumbnail generation. This issue is triggered when processing a specially crafted 'DjVu' file.
Note: Successful exploitation of this issue requires 'DjVu' file type upload support to be enabled.
2. A remote code-execution vulnerability because of an error related to thumbnail generation. This issue is triggered when processing a specially crafted 'PDF' file in the 'PdfHandler' extension.
Note: Successful exploitation of this issue requires 'PDF' file type upload support to be enabled.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts may result in denial-of-service conditions.
Affected
Versions prior to 1.22.2, 1.21.5, or 1.19.11 are vulnerable.
|
WebAttackMediawikiThumb.phpCVE-2014-16102
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts of leveraging multiple vulnerabilities in MediaWiki which could leads to arbitrary code execution.
Additional Information
MediaWiki is a media and image content wiki application.
MediaWiki is prone to the following remote code execution vulnerabilities:
1. A remote code-execution vulnerability because of an error related to thumbnail generation. This issue is triggered when processing a specially crafted 'DjVu' file.
Note: Successful exploitation of this issue requires 'DjVu' file type upload support to be enabled.
2. A remote code-execution vulnerability because of an error related to thumbnail generation. This issue is triggered when processing a specially crafted 'PDF' file in the 'PdfHandler' extension.
Note: Successful exploitation of this issue requires 'PDF' file type upload support to be enabled.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts may result in denial-of-service conditions.
Affected
Versions prior to 1.22.2, 1.21.5, or 1.19.11 are vulnerable.
|
WebAttackMelisPlatformCMSCVE-2022-39297
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Deserialization Remote Code Execution vulnerability on the affected machine.
Additional Information
Melis Platform MelisCMS is vulnerable to Deserialization Remote Code Execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
MelisCMS prior to version 5.0.0
Response
|
Web Attack: Memory Heap Spray
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature generically detects an attempt to exploit a buffer overflow vulnerability either in a browser or in an ActiveX control.
Additional Information
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application.
Response
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Disable System Restore (Windows Me/XP).
2. Update the virus definitions.
3. Run a full system scan.
|
Web Attack: Metabase LFI CVE-2021-41277
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a local file inclusion vulnerability in Metabase platform.
Additional Information
A vulnerability exists in Metabase platform that can lead to local file inclusion.
Affected
Versions x.40.0-x.40.4 are affected.
Response
|
Web Attack: Metabase RCE Vulnerability CVE-2023-38646
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Metabase.
Additional Information
Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation.
Affected
Metabase open source before 0.46.6.1
Metabase Enterprise before 1.46.6.1
Response
|
WebAttackMetasploitBase64encodedwarpayload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts of posting war payload from Metasploit which could lead to arbitrary code execution.
Additional Information
Metasploit generates war file, which will carry a common metasploit payload to facilitate further exploitation.
Affected
vary
|
WebAttackMetasploitdnaLIMSCommandExecutionAttack
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts by metasploit to upload files into vulnerable applications and servers.
Additional Information
There exists an file upload vulnerablity in several applications that could result to remote code execution.
Affected
Multipile
|
Web Attack: Metasploit JSP Payload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects activity of uploading jsp payload by metasploit.
Additional Information
Metasploit uploads jsp payload to the affected system.
Affected
Vary
|
WebAttackMetasploitLogsignRCEAttack
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts by metasploit to upload files into vulnerable applications and servers.
Additional Information
There exists an file upload vulnerablity in several applications that could result to remote code execution.
Affected
Multipile
|
WebAttackMetasploitPayloadDownloadActivity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects payload activity of metasploit web delivery module.
Additional Information
The attacker fires up a web server that serves a payload, when an attacker has physical access to the target machine, a simple command can load a waiting payload in a remote server via HTTP. This payload is loaded in memory and does not write to the disk so it potentially evade AV detections.
Affected
Multipile
|
WebAttackMetasploitPayloadWebDelivery
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects payload activity of metasploit web delivery module.
Additional Information
The attacker fires up a web server that serves a payload, when an attacker has physical access to the target machine, a simple command can load a waiting payload in a remote server via HTTP. This payload is loaded in memory and does not write to the disk so it potentially evade AV detections.
Affected
Multipile
|
WebAttackMetasploitSilverlightDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a Double Dereference vulnerability in Microsoft Silverlight which may result in remote code execution.
Additional Information
Microsoft Silverlight is a web application framework that provides support for .NET applications. Its security model limits the privileges granted to .NET applications.
Silverlight is prone to a remote code-execution vulnerability due to a double dereference error. This may allow an attacker to access the memory in an unsafe manner using a specially crafted application. An attacker can exploit this issue to install programs, view, change, or delete data, or create new accounts with full user rights.
Successful exploit may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will likely result in a denial-of-service condition.
Affected
Microsoft Silverlight
|
WebAttackMetasploitwarpayload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts of posting war payload from Metasploit which could lead to arbitrary code execution.
Additional Information
Metasploit generates war file, which will carry a common metasploit payload to facilitate further exploitation.
Affected
vary
|
Web Attack: Meterpreter Python Payload Download
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Metasploit Meterpreter activity on the compromised machine.
Additional Information
Meterpreter is one of the advanced payload included with Metasploit framework. It helps establishing a backdoor on the machine through which the attacker can connect and execute commands.
Affected
Various platforms
|
WebAttackMHTMLScriptCodeInjectionVulnerability
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detect attempts for malicious execution scripts which may further lead to information disclosure.
Additional Information
The malicious intent of an attacker could be to use information disclosure by exploiting this vulnerability
Affected
Various
|
WebAttackMicrosoftActiveXDataObjectsRCECVE-2019-0888
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft ActiveX Data Objects.
Additional Information
Microsoft Windows ActiveX Data Objects is prone to a remote code-execution vulnerability because it fails to properly handle objects in memory. An attacker can exploit this issue by enticing a victim to open specially crafted file.
An attacker can exploit this issue to execute arbitrary code with elevated privileges. Failed attacks will cause denial of service conditions.
Affected
Microsoft Windows Server 2019
Microsoft Windows Server 2016
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2008 R2 for x64-based Systems SP1
Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1
Microsoft Windows Server 2008 for x64-based Systems SP2
Microsoft Windows Server 2008 for Itanium-based Systems SP2
Microsoft Windows Server 2008 for 32-bit Systems SP2
Microsoft Windows Server 1803
Microsoft Windows Server 1709
Microsoft Windows RT 8.1
Microsoft Windows 8.1 for x64-based Systems
Microsoft Windows 8.1 for 32-bit Systems
Microsoft Windows 7 for x64-based Systems SP1
Microsoft Windows 7 for 32-bit Systems SP1
Microsoft Windows 10 Version 1903 for x64-based Systems
Microsoft Windows 10 Version 1903 for ARM64-based Systems
Microsoft Windows 10 Version 1903 for 32-bit Systems
Microsoft Windows 10 Version 1809 for x64-based Systems
Microsoft Windows 10 Version 1809 for ARM64-based Systems
Microsoft Windows 10 Version 1809 for 32-bit Systems
Microsoft Windows 10 Version 1803 for x64-based Systems
Microsoft Windows 10 Version 1803 for ARM64-based Systems
Microsoft Windows 10 Version 1803 for 32-bit Systems
Microsoft Windows 10 version 1709 for x64-based Systems
Microsoft Windows 10 Version 1709 for ARM64-based Systems
Microsoft Windows 10 version 1709 for 32-bit Systems
Microsoft Windows 10 version 1703 for x64-based Systems
Microsoft Windows 10 version 1703 for 32-bit Systems
Microsoft Windows 10 Version 1607 for x64-based Systems
Microsoft Windows 10 Version 1607 for 32-bit Systems
Microsoft Windows 10 for x64-based Systems
Microsoft Windows 10 for 32-bit Systems
|
WebAttackMicrosoftChakraScriptEngineCVE-2019-0539
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the scripting engine fails to properly handle objects in memory in Microsoft Edge.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Edge for Microsoft Windows 10 and Server 2016.
|
WebAttackMicrosoftCommonControlsCVE-2012-0158
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Windows Common Controls.
Additional Information
Microsoft Windows Common Control Library is used by Windows Explorer to create controls such as list view, header, tree tip, tooltip, tool bar, status bar, etc.
The application is prone to a remote code-execution vulnerability. Specifically, this issue affects 'MSCOMCTL.TreeView', 'MSCOMCTL.ListView2', 'MSCOMCTL.TreeView2', and 'MSCOMCTL.ListView' ActiveX controls contained in the 'MSCOMCTL.OCX' file. The controls are identified by the following CLSIDs:
bdd1f04b-858b-11d1-b16a-00c0f0283628
996BF5E0-8044-4650-ADEB-0B013914E99C
C74190B6-8589-11d1-B16A-00C0F0283628
9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E
An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage.
Successful exploits will allow the attacker to execute arbitrary code within the context of the application (typically Internet Explorer) that uses the ActiveX control.
Affected
Microsoft Visual FoxPro 9.0 SP2
Microsoft Visual FoxPro 9.0 SP1
Microsoft Visual FoxPro 8.0 SP1
Microsoft Visual FoxPro 8.0
Microsoft Visual Basic 6.0
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
Microsoft SQL Server 2008 x64 SP3
Microsoft SQL Server 2008 x64 SP2
Microsoft SQL Server 2008 itanium SP3
Microsoft SQL Server 2008 itanium SP2
Microsoft SQL Server 2008 itanium SP1
Microsoft SQL Server 2008 itanium R2
Microsoft SQL Server 2008 32-bit SP3
Microsoft SQL Server 2008 32-bit SP2
Microsoft SQL Server 2008 32-bit R2
Microsoft SQL Server 2008 R2 SP1
Microsoft SQL Server 2008 R2
Microsoft SQL Server 2008 0
Microsoft SQL Server 2005 x64 Edition SP4
Microsoft SQL Server 2005 x64 Edition SP3
Microsoft SQL Server 2005 x64 Edition SP2
Microsoft SQL Server 2005 x64 Edition SP1
Microsoft SQL Server 2005 Itanium Edition SP4
Microsoft SQL Server 2005 Itanium Edition SP3
Microsoft SQL Server 2005 Itanium Edition SP2
Microsoft SQL Server 2005 Itanium Edition SP1
Microsoft SQL Server 2005 Itanium Edition 0
Microsoft SQL Server 2005 Express Edition SP4
Microsoft SQL Server 2005 Express Edition SP3
Microsoft SQL Server 2005 Express Edition SP2
Microsoft SQL Server 2005 Express Edition SP1
Microsoft SQL Server 2000 SP4
Microsoft SQL Server 2000 SP3
Microsoft SQL Server 2000 SP2
Microsoft SQL Server 2000 SP1
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
Microsoft SQL Server 2000
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0
Microsoft Office 2010 (32-bit edition) 0
Microsoft Office 2010 0
Microsoft Office 2010 (32-bit edition) SP1
Microsoft Office 2007 SP2
Microsoft Office 2007 SP1
Microsoft Office 2003 Web Components SP3
Microsoft Office 2003 SP3
Microsoft Office 2003 SP2
Microsoft Office 2003 SP1
Microsoft Commerce Server 2009 R2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2009 0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2002 SP4
Microsoft Commerce Server 2002 SP3
Microsoft Commerce Server 2002 SP2
Microsoft Commerce Server 2002 SP1
Microsoft BizTalk Server 2002 SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
|
WebAttackMicrosoftCommonControlsCVE-2012-01582
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Windows Common Controls.
Additional Information
Microsoft Windows Common Control Library is used by Windows Explorer to create controls such as list view, header, tree tip, tooltip, tool bar, status bar, etc.
The application is prone to a remote code-execution vulnerability. Specifically, this issue affects 'MSCOMCTL.TreeView', 'MSCOMCTL.ListView2', 'MSCOMCTL.TreeView2', and 'MSCOMCTL.ListView' ActiveX controls contained in the 'MSCOMCTL.OCX' file. The controls are identified by the following CLSIDs:
bdd1f04b-858b-11d1-b16a-00c0f0283628
996BF5E0-8044-4650-ADEB-0B013914E99C
C74190B6-8589-11d1-B16A-00C0F0283628
9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E
An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage.
Successful exploits will allow the attacker to execute arbitrary code within the context of the application (typically Internet Explorer) that uses the ActiveX control.
Affected
Microsoft Visual FoxPro 9.0 SP2
Microsoft Visual FoxPro 9.0 SP1
Microsoft Visual FoxPro 8.0 SP1
Microsoft Visual FoxPro 8.0
Microsoft Visual Basic 6.0
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
Microsoft SQL Server 2008 x64 SP3
Microsoft SQL Server 2008 x64 SP2
Microsoft SQL Server 2008 itanium SP3
Microsoft SQL Server 2008 itanium SP2
Microsoft SQL Server 2008 itanium SP1
Microsoft SQL Server 2008 itanium R2
Microsoft SQL Server 2008 32-bit SP3
Microsoft SQL Server 2008 32-bit SP2
Microsoft SQL Server 2008 32-bit R2
Microsoft SQL Server 2008 R2 SP1
Microsoft SQL Server 2008 R2
Microsoft SQL Server 2008 0
Microsoft SQL Server 2005 x64 Edition SP4
Microsoft SQL Server 2005 x64 Edition SP3
Microsoft SQL Server 2005 x64 Edition SP2
Microsoft SQL Server 2005 x64 Edition SP1
Microsoft SQL Server 2005 Itanium Edition SP4
Microsoft SQL Server 2005 Itanium Edition SP3
Microsoft SQL Server 2005 Itanium Edition SP2
Microsoft SQL Server 2005 Itanium Edition SP1
Microsoft SQL Server 2005 Itanium Edition 0
Microsoft SQL Server 2005 Express Edition SP4
Microsoft SQL Server 2005 Express Edition SP3
Microsoft SQL Server 2005 Express Edition SP2
Microsoft SQL Server 2005 Express Edition SP1
Microsoft SQL Server 2000 SP4
Microsoft SQL Server 2000 SP3
Microsoft SQL Server 2000 SP2
Microsoft SQL Server 2000 SP1
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
Microsoft SQL Server 2000
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0
Microsoft Office 2010 (32-bit edition) 0
Microsoft Office 2010 0
Microsoft Office 2010 (32-bit edition) SP1
Microsoft Office 2007 SP2
Microsoft Office 2007 SP1
Microsoft Office 2003 Web Components SP3
Microsoft Office 2003 SP3
Microsoft Office 2003 SP2
Microsoft Office 2003 SP1
Microsoft Commerce Server 2009 R2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2009 0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2002 SP4
Microsoft Commerce Server 2002 SP3
Microsoft Commerce Server 2002 SP2
Microsoft Commerce Server 2002 SP1
Microsoft BizTalk Server 2002 SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
|
WebAttackMicrosoftCommonControlsCVE-2012-01583
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Windows Common Controls.
Additional Information
Microsoft Windows Common Control Library is used by Windows Explorer to create controls such as list view, header, tree tip, tooltip, tool bar, status bar, etc.
The application is prone to a remote code-execution vulnerability. Specifically, this issue affects 'MSCOMCTL.TreeView', 'MSCOMCTL.ListView2', 'MSCOMCTL.TreeView2', and 'MSCOMCTL.ListView' ActiveX controls contained in the 'MSCOMCTL.OCX' file. The controls are identified by the following CLSIDs:
bdd1f04b-858b-11d1-b16a-00c0f0283628
996BF5E0-8044-4650-ADEB-0B013914E99C
C74190B6-8589-11d1-B16A-00C0F0283628
9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E
An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage.
Successful exploits will allow the attacker to execute arbitrary code within the context of the application (typically Internet Explorer) that uses the ActiveX control.
Affected
Microsoft Visual FoxPro 9.0 SP2
Microsoft Visual FoxPro 9.0 SP1
Microsoft Visual FoxPro 8.0 SP1
Microsoft Visual FoxPro 8.0
Microsoft Visual Basic 6.0
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
Microsoft SQL Server 2008 x64 SP3
Microsoft SQL Server 2008 x64 SP2
Microsoft SQL Server 2008 itanium SP3
Microsoft SQL Server 2008 itanium SP2
Microsoft SQL Server 2008 itanium SP1
Microsoft SQL Server 2008 itanium R2
Microsoft SQL Server 2008 32-bit SP3
Microsoft SQL Server 2008 32-bit SP2
Microsoft SQL Server 2008 32-bit R2
Microsoft SQL Server 2008 R2 SP1
Microsoft SQL Server 2008 R2
Microsoft SQL Server 2008 0
Microsoft SQL Server 2005 x64 Edition SP4
Microsoft SQL Server 2005 x64 Edition SP3
Microsoft SQL Server 2005 x64 Edition SP2
Microsoft SQL Server 2005 x64 Edition SP1
Microsoft SQL Server 2005 Itanium Edition SP4
Microsoft SQL Server 2005 Itanium Edition SP3
Microsoft SQL Server 2005 Itanium Edition SP2
Microsoft SQL Server 2005 Itanium Edition SP1
Microsoft SQL Server 2005 Itanium Edition 0
Microsoft SQL Server 2005 Express Edition SP4
Microsoft SQL Server 2005 Express Edition SP3
Microsoft SQL Server 2005 Express Edition SP2
Microsoft SQL Server 2005 Express Edition SP1
Microsoft SQL Server 2000 SP4
Microsoft SQL Server 2000 SP3
Microsoft SQL Server 2000 SP2
Microsoft SQL Server 2000 SP1
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
Microsoft SQL Server 2000
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0
Microsoft Office 2010 (32-bit edition) 0
Microsoft Office 2010 0
Microsoft Office 2010 (32-bit edition) SP1
Microsoft Office 2007 SP2
Microsoft Office 2007 SP1
Microsoft Office 2003 Web Components SP3
Microsoft Office 2003 SP3
Microsoft Office 2003 SP2
Microsoft Office 2003 SP1
Microsoft Commerce Server 2009 R2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2009 0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2002 SP4
Microsoft Commerce Server 2002 SP3
Microsoft Commerce Server 2002 SP2
Microsoft Commerce Server 2002 SP1
Microsoft BizTalk Server 2002 SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
|
WebAttackMicrosoftCommonControlsCVE-2012-01584
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Windows Common Controls.
Additional Information
Microsoft Windows Common Control Library is used by Windows Explorer to create controls such as list view, header, tree tip, tooltip, tool bar, status bar, etc.
The application is prone to a remote code-execution vulnerability. Specifically, this issue affects 'MSCOMCTL.TreeView', 'MSCOMCTL.ListView2', 'MSCOMCTL.TreeView2', and 'MSCOMCTL.ListView' ActiveX controls contained in the 'MSCOMCTL.OCX' file. The controls are identified by the following CLSIDs:
bdd1f04b-858b-11d1-b16a-00c0f0283628
996BF5E0-8044-4650-ADEB-0B013914E99C
C74190B6-8589-11d1-B16A-00C0F0283628
9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E
An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage.
Successful exploits will allow the attacker to execute arbitrary code within the context of the application (typically Internet Explorer) that uses the ActiveX control.
Affected
Microsoft Visual FoxPro 9.0 SP2
Microsoft Visual FoxPro 9.0 SP1
Microsoft Visual FoxPro 8.0 SP1
Microsoft Visual FoxPro 8.0
Microsoft Visual Basic 6.0
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
Microsoft SQL Server 2008 x64 SP3
Microsoft SQL Server 2008 x64 SP2
Microsoft SQL Server 2008 itanium SP3
Microsoft SQL Server 2008 itanium SP2
Microsoft SQL Server 2008 itanium SP1
Microsoft SQL Server 2008 itanium R2
Microsoft SQL Server 2008 32-bit SP3
Microsoft SQL Server 2008 32-bit SP2
Microsoft SQL Server 2008 32-bit R2
Microsoft SQL Server 2008 R2 SP1
Microsoft SQL Server 2008 R2
Microsoft SQL Server 2008 0
Microsoft SQL Server 2005 x64 Edition SP4
Microsoft SQL Server 2005 x64 Edition SP3
Microsoft SQL Server 2005 x64 Edition SP2
Microsoft SQL Server 2005 x64 Edition SP1
Microsoft SQL Server 2005 Itanium Edition SP4
Microsoft SQL Server 2005 Itanium Edition SP3
Microsoft SQL Server 2005 Itanium Edition SP2
Microsoft SQL Server 2005 Itanium Edition SP1
Microsoft SQL Server 2005 Itanium Edition 0
Microsoft SQL Server 2005 Express Edition SP4
Microsoft SQL Server 2005 Express Edition SP3
Microsoft SQL Server 2005 Express Edition SP2
Microsoft SQL Server 2005 Express Edition SP1
Microsoft SQL Server 2000 SP4
Microsoft SQL Server 2000 SP3
Microsoft SQL Server 2000 SP2
Microsoft SQL Server 2000 SP1
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
Microsoft SQL Server 2000
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0
Microsoft Office 2010 (32-bit edition) 0
Microsoft Office 2010 0
Microsoft Office 2010 (32-bit edition) SP1
Microsoft Office 2007 SP2
Microsoft Office 2007 SP1
Microsoft Office 2003 Web Components SP3
Microsoft Office 2003 SP3
Microsoft Office 2003 SP2
Microsoft Office 2003 SP1
Microsoft Commerce Server 2009 R2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2009 0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2002 SP4
Microsoft Commerce Server 2002 SP3
Microsoft Commerce Server 2002 SP2
Microsoft Commerce Server 2002 SP1
Microsoft BizTalk Server 2002 SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
|
Web Attack: Microsoft Defender CVE-2021-42298
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Remote Code Execution vulnerability on the affected machine.
Additional Information
Microsoft Defender is vulnerable to Remote Code Execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
Various Windows machines.
Response
|
WebAttackMicrosoftDirectPlayCVE-2012-1537
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in DirectPlay DirectX library.
Additional Information
A vulnerability in the DirectPlay component of the DirectX library on Windows can result in remote code execution.
Affected
Various Microsoft Windows Platforms
|
WebAttackMicrosoftDirectXWAVandAVIFileParsingRemoteCodeExecutionCVE-2007-3895
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a vulnerability in Microsoft DirectShow when opening a maliciously crafted file which could result in remote code execution.
Additional Information
Microsoft DirectX is a component for Microsoft Windows. Microsoft DirectShow is an integrated component for DirectX that allows users to stream media.
DirectX is prone to a remote code-execution vulnerability. This issue occurs when Microsoft DirectShow fails to perform sufficient validation of WAV and AVI file parameters.
An attacker could exploit this issue by enticing an unsuspecting victim to open a malicious WAV or AVI file.
Successfully exploiting this issue will allow the attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed exploit attempts will crash the application.
Affected
Avaya Messaging Application Server MM 1.1, MM 2.0, MM 3.0, MM 3.1
HP Storage Management Appliance 2.1, I, II, III
Microsoft DirectX 7.0, 8.1, 9.0 c, 10.0
Nortel Networks CallPilot 1002rp, 200i, 201i, 702t, 703t
Nortel Networks Centrex IP Client Manager 10.0, 9.0
Response
Microsoft has released updates and an advisory to address this issue. Please see the references for more information.
|
WebAttackMicrosoftDNSListDrive-ByDownloadActivity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempts of Microsoft DNSList utility performing Drive-By download downloading malicious payload.
Additional Information
DNSLint is a Microsoft Windows CL utility that helps you to diagnose common DNS name resolution issues. The tool doesn't verify domain names when parsing DNS text-files using the "/ql" switch making it prone to forced drive-by
downloads, providing an end user is tricked into using a server text-file containing a script/binary reference instead of
a normally expected domain name.
Affected
Microsoft Windows with DNSList installed.
Response
|
WebAttackMicrosoftDotNetFrameworkRCECVE-2020-0646
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft .NET framework.
Additional Information
Microsoft .NET Framework is prone to a remote code-execution vulnerability because it fails to properly validate the input. An attacker can exploit this issue by sending specially crafted inputs to the affected application utilizing susceptible .Net methods.
An attacker can leverage this issue to execute arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely result in denial of service conditions.
Affected
Microsoft .NET Framework.
|
WebAttackMicrosoftDynamicsCRMXSS
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a cross site scripting vulnerability in Microsoft Dynamics CRM.
Additional Information
A flaw exists in Microsoft Dynamics CRM that can allow attackers to perform Cross Site Scripting Attacks.
The specific vulnerability exists in the 'SyncFilterPage.aspx' which doesn't validate the inputs properly.
Affected
Microsoft Dynamics CRM
Response
|
WebAttackMicrosoftEdgeACGBypassDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to bypass certain Microsoft Edge security restrictions and perform unauthorized actions.
Additional Information
Microsoft Edge is prone to a security-bypass vulnerability because it fails to properly handles requests of different origins. An attacker can exploit this issue to bypass AC using 'UnmapViewOfFile()' function.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks.
Affected
Microsoft Edge
|
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-0989
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
ChakraCore and Microsoft Edge
|
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-0993
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
ChakraCore and Microsoft Edge.
|
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-1003
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
ChakraCore and Microsoft Edge.
|
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-1024
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
ChakraCore and Microsoft Edge.
|
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-1052
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
ChakraCore and Microsoft Edge.
|
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-1103
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Edge Windows 10, Server 2016, and Server 2019
|
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-1106
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Edge Windows 10, Server 2016, and Server 2019
|
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-1107
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Edge Windows 10, Server 2016, and Server 2019
|
WebAttackMicrosoftEdgeChakraScriptingEngineCVE-2019-1196
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra scripting engine fails to properly handle objects in memory.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Edge Windows 10 and Server 2019
Response
|
WebAttackMicrosoftEdgeCVE-2016-3294
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to execute arbitrary code in the context of the currently logged-in user.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability because it improperly accesses objects in memory.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. This allows the attacker to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Edge
|
WebAttackMicrosoftEdgeCVE-2016-3377
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Successful exploits will allow attackers to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Microsoft Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra JavaScript engine fails to properly handle objects in memory during rendering process.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Edge
|
WebAttackMicrosoftEdgeCVE-2016-7200
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the Chakra JavaScript engines fail to properly handle objects in memory during the rendering process.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.
This could allow the attacker to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Multiple version of Edge.
|
WebAttackMicrosoftEdgeCVE-2017-11845
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability because it fails to properly access objects in memory.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
multiple versions of Edge.
|
WebAttackMicrosoftEdgeCVE-2017-8734
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote memory corruption vulnerability in Microsoft Edge.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability because it fails to properly access objects in memory.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Edge 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 Version 1607 for 32-bit Systems 0
+ Microsoft Windows 10 Version 1607 for x64-based Systems 0
+ Microsoft Windows Server 2016 for x64-based Systems 0
|
WebAttackMicrosoftEdgeCVE-2017-8757
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Edge.
Additional Information
Microsoft Edge is a web browser available for Microsoft Windows.
Microsoft Edge is prone to a remote code-execution vulnerability because it fail to properly handle objects in memory. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Edge 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 Version 1607 for 32-bit Systems 0
+ Microsoft Windows 10 Version 1607 for x64-based Systems 0
+ Microsoft Windows Server 2016 for x64-based Systems 0
|
WebAttackMicrosoftEdgeCVE-2018-8179
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because it fails to properly handle objects in memory.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. This could allow the attacker to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Edge supported products.
|
WebAttackMicrosoftEdgeCVE-2018-8456
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Microsoft ChakraCore Scripting Engine is prone to a remote memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Chakra is a JavaScript engine developed by Microsoft for its Microsoft Edge web browser. ChakraCore is the core part of Chakra JavaScript engine.
Microsoft ChakraCore Scripting Engine is prone to a remote memory-corruption vulnerability because it fails to properly handle objects in memory.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft ChakraCore
Microsoft Edge
Response
Updates are available. Please see the references or vendor advisory for more information.
|
WebAttackMicrosoftEdgeCVE-2018-8463Activity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the affected device.
Additional Information
Microsoft Edge is a web browser available for Microsoft Windows.
Microsoft Edge is prone to a remote privilege-escalation vulnerability. Specifically, this issue occurs because of an error in the implementation of sandbox. An attacker can exploit this issue to escape from the AppContainer sandbox in the browser.
An attacker can exploit this issue to gain elevated privileges.
Affected
Microsoft Edge
|
WebAttackMicrosoftEdgeCVE-2018-8469
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to to gain elevated privileges on vulnerable Microsoft Edge.
Additional Information
Microsoft Edge is a web browser available for Microsoft Windows.
Microsoft Edge is prone to a remote privilege-escalation vulnerability. Specifically, this issue occurs because of an error in the implementation of sandbox. An attacker can exploit this issue to escape from the AppContainer sandbox in the browser.
An attacker can exploit this issue to gain elevated privileges.
Affected
Various version of Microsoft Edge on Windows 10 and Windows Server 2016.
|
WebAttackMicrosoftEdgeCVE-2019-0810Activity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability because it fails to properly handle objects in memory.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Various versions of Microsoft Edge
|
WebAttackMicrosoftEdgeCVE-2019-0812
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability because it fails to properly handle objects in memory.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Various version of Microsoft Edge on Windows 10, Windows Server 2016, and Windows Server 2019.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.