text
stringlengths
0
383k
WebAttackMozillaFirefoxCVE-2018-18500Activity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the browser, gain elevated privileges, or cause denial-of-service conditions. Additional Information Firefox is a browser and available for multiple platforms. Mozilla Firefox is prone to the following security vulnerabilities: 1. A use-after-free denial-of-service vulnerability that occurs when handling a specially-crafted HTML5 stream. An attacker can exploit this issue to free stream parser object. [CVE-2018-18500] 2. A privilege-escalation vulnerability that occurs due to insufficient authentication during the communication between IPC endpoints and server parents. An attacker can exploit this issue escape sandbox by using specially-crafted messages in the listener process. [CVE-2018-18505] 3. Multiple security vulnerabilities. Specifically, these issues occur because of memory safety bugs. [CVE-2018-18501] Attackers can exploit these issues to execute arbitrary code in the context of the browser, gain elevated privileges; or cause denial-of-service conditions. Affected Thunderbird before 60.5, Firefox ESR before 60.5, and Firefox before 65
WebAttackMozillaFirefoxCVE-2019-11697 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to bypass certain security restrictions to perform unauthorized actions, crash the application, execute arbitrary code or obtain sensitive information. Failed exploit attempts will likely result in denial-of-service conditions. Additional Information Firefox is a browser and available for multiple platforms. Mozilla Firefox is prone to the following security vulnerabilities: 1. A security-bypass vulnerability. Specifically, this issue occurs because a custom cursor defined by scripting can position itself over the addressbar to spoof the actual cursor when it should not be allowed. [CVE-2019-11695] 2. A security vulnerability. Specifically, this issue occurs because '.JNLP' extensions files for 'Java web start' applications are not treated as executable content. This may allow attacker to mistakenly launch an executable binary locally. [CVE-2019-11696] 3. A security-bypass vulnerability. Specifically, this issue occurs when the key 'ALT' and 'a' is pressed, it will install the extension without the install prompt delay and that keeps the prompt visible to accept or decline installation by the user. [CVE-2019-11697] 4. A address bar spoofing vulnerability. Specifically, this issue occurs because it highlights the wrong domain name in the addressbar during page navigation. [CVE-2019-11699] 5. An arbitrary file-access vulnerability. An attacker can exploit this issue by using a hyperlink that uses the 'res:' protocol to open files at known location in Internet Explorer. [CVE-2019-11700] Note: This issue only affects Windows. 6. A security vulnerability. Specifically, this issue occurs because default 'webcal:' protocol loads a website that is vulnerable cross-site scripting attacks. [CVE-2019-11701] 7. A security vulnerability. Specifically, these issues occur because of memory safety bugs. An attacker can exploit this issue to corrupt the memory and execute arbitrary code. [CVE-2019-9814] 8. A denial-of-service vulnerability that occurs due to a use-after-free error. Specifically, this issue affects the 'AssertWorkerThread' function. An attacker can exploit this issue to cause a crash. [CVE-2019-9821] Attackers can exploit these issues to bypass certain security restrictions to perform unauthorized actions, crash the application, execute arbitrary code or obtain sensitive information. Failed exploit attempts will likely result in denial-of-service conditions. Affected Mozilla Firefox versions prior to 67 Mozilla Firefox ESR versions prior to 60.7
WebAttackMozillaFirefoxCVE-2019-11708 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects to exploit Security Bypass vulnerability on the affected product. Additional Information Mozilla Firefox and Firefox ESR are prone to a security-bypass vulnerability. Specifically, this issue occurs due to insufficient vetting of parameters passed with the 'Prompt:Open' IPC message between child and parent processes resulting in opening of an non-sandboxed parent process. This issue may lead to further execution of arbitrary code when used in conjunction with another vulnerability. An attacker may leverage this issue to bypass certain security restrictions and perform unauthorized actions. Affected This vulnerability affects Firefox ESR prior to version 60.7.2, Firefox prior to version 67.0.4, and Thunderbird prior to version 60.7.2. Response Updates are available. Please see the references or vendor advisory for more information.
WebAttackMozillaFirefoxCVE-2019-17026 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Type Confusion Remote Code Execution vulnerability in the affected machines. Additional Information Mozilla Firefox is a web browser. Mozilla Firefox and Firefox ESR are prone to a remote code-execution vulnerability due type confusion error. Specifically, this issue occurs with 'StoreElementHole' and 'FallibleStoreElement'. An attacker can exploit this issue to execute arbitrary code in the context of the currently logged-in user. This may allow an attacker to run code on a target system. An attacker can exploit this issue to execute arbitrary code in the context of the application. Affected This vulnerability affects Firefox ESR prior to version 68.4.1, Thunderbird prior to version 68.4.1, and Firefox prior to version 72.0.1.
WebAttackMozillaFirefoxCVE-2019-9810Activity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the browser, gain elevated privileges, or cause denial-of-service conditions. Additional Information Firefox is a browser and available for multiple platforms. Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. The attacker can then execute arbitrary code in the context of the browser, gain elevated privileges, or cause denial-of-service conditions. Affected Firefox before 66.0.1, Firefox ESR before 60.6.1, and Thunderbird before 60.6.1. Response
WebAttackMozillaFirefoxCVE-2020-12418 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Information Disclosure vulnerability on the affected machine. Additional Information Mozilla Firefox, Firefox ESR and Thunderbird are prone to an information-disclosure vulnerability. Manipulating individual parts of a URL object could have caused an out-of-bounds read, leaking process memory to malicious JavaScript. Affected Firefox ESR prior to version 68.10, Firefox prior to version 78, and Thunderbird prior to version 68.10.0. Response
WebAttackMozillaFirefoxCVE-2020-15680 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Information Disclosure vulnerability on the affected machine. Additional Information Mozilla Firefox is prone to an information-disclosure vulnerability. If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered. Affected Firefox below version 82 Response Update to the latest available version.
WebAttackMozillaFirefoxPDFJSPrivilegeEscalationCVE-2015-0816 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit Firefox PDF.js Privilege Escalation bug which may lead to arbitrary code execution. Additional Information This signature detects attempts to exploit Firefox PDF.js Privilege Escalation bug which may lead to arbitrary code execution. Affected Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6
WebAttackMozillaFirefoxRemoteCodeExecutionVulnerability Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in the Mozilla Firefox application by using a malformed SVG file. Additional Information Multiple Mozilla products are prone to multiple vulnerabilities. These issues include various memory-corruption, code-injection, and access-restriction-bypass vulnerabilities. The following specific issues exist: - An error in the JavaScript engine occurs when dealing with certain temporary variables during garbage collection. Successful exploitation may result in memory corruption and possibly the execution of arbitrary commands. - A memory-corruption error occurs when dynamically changing the style of an element from 'position:relative' to 'position:static', causing Gecko to operate on freed memory. Successful exploitation may permit an attacker to execute arbitrary code. This issue does not affect Firefox 1.0 or Mozilla Suite 1.7. - A problem occurs when calling the 'QueryInterface' method, part of the built-in Location and Navigator objects. A memory corruption occurs that may be exploited to run arbitrary code. This issue does not affect Firefox 1.0 or older Mozilla Suite 1.7. However, this issue may affect Thunderbird 1.5 if JavaScript is enabled in mail; this is not the default setting. - The 'XULDocument.persist()' does not properly validate the attribute name. Exploitation may permit an attacker to inject XML into the 'localstore.rdf' that would be executed at startup. Thunderbird may be vulnerable to this issue if JavaScript is enabled in mail; this is not the default setting. - An integer-overflow vulnerability exists in the new E4X, SVG, and Canvas features. The resultant memory corruption may permit the execution of arbitrary attacker-supplied code. These issues do not affect Firefox 1.0 or Mozilla Suite 1.7. Thunderbird 1.5 may be vulnerable if JavaScript is enabled in mail; this is not the default setting. - A buffer-overflow vulnerability was introduced in an upgrade in the XML parser. Exploitation of this issue will likely crash the application. The execution of arbitrary code is likely not possible. Firefox 1.0 and Mozilla Suite 1.7 are not affected by this issue. - An error in the E4X implementation exposes the internal 'AnyName' object to web content. An attacker may be able to exploit this issue to bypass same-origin restrictions that prevent direct access from one window frame to another. This issue does not affect Firefox 1.0 or Mozilla Suite 1.7. Thunderbird 1.5 may be vulnerable if JavaScript is enabled in mail; this is not the default setting. Other undisclosed issues may have also been addressed in the various updated vendor applications. Affected Conectiva Linux 6.0, 7.0, 8.0 Debian Linux 3.1, 3.1 alpha, 3.1 amd64, 3.1 arm, 3.1 hppa, 3.1 ia-32, 3.1 ia-64, 3.1 m68k, 3.1 mips, 3.1 mipsel, 3.1 ppc, 3.1 s/390, 3.1 sparc Gentoo Linux HP HP-UX B.11.00, B.11.11, B.11.22, B.11.23 HP Tru64 5.1 A PK6, 5.1 A PK6 (BL24), 5.1 B PK4, 5.1 B-2 PK4, 5.1 B-2 PK4 (BL25) MandrakeSoft Corporate Server 3.0, 3.0 x86_64 MandrakeSoft Linux Mandrake 8.0, 8.0 ppc, 2006.0, 2006.0 x86_64 Mozilla Browser 0.8, 0.9.2, 0.9.2.1, 0.9.3, 0.9.4, 0.9.4.1, 0.9.5, 0.9.6, 0.9.7, 0.9.8, 0.9.9, 0.9.35, 0.9.48, 1.0, 1.0 RC1, 1.0 RC2, 1.0.1, 1.0.2, 1.1, 1.1 Alpha, 1.1 Beta, 1.2, 1.2 Alpha, 1.2 Beta, 1.2.1, 1.3, 1.3.1, 1.4, 1.4 a, 1.4 b, 1.4.1, 1.4.2, 1.4.4, 1.5, 1.5.1, 1.6, 1.7, 1.7 alpha, 1.7 beta, 1.7 rc1, 1.7 rc2, 1.7 rc3, 1.7.1, 1.7.2, 1.7.3, 1.7.4, 1.7.5, 1.7.6, 1.7.7, 1.7.8, 1.7.9, 1.7.10, 1.7.11, 1.7.12 Mozilla Firefox Preview Release, 0.8, 0.9, 0.9 rc, 0.9.1, 0.9.2, 0.9.3, 0.10, 0.10.1, 1.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.5, 1.5 beta 1, 1.5 beta 2 Mozilla SeaMonkey 1.0 dev Mozilla Thunderbird 0.6, 0.7, 0.7.1, 0.7.2, 0.7.3, 0.8, 0.9, 1.0, 1.0.1, 1.0.2, 1.0.5, 1.0.6, 1.0.7, 1.5, 1.5 beta 2 RedHat Advanced Workstation for the Itanium Processor 2.1, 2.1 IA64 RedHat Desktop 3.0, 4.0 RedHat Enterprise Linux AS 2.1, AS 2.1 IA64, AS 3, AS 4, ES 2.1, ES 2.1 IA64, ES 3, ES 4, WS 2.1, WS 2.1 IA64, WS 3, WS 4 RedHat Fedora Core1, Core2, Core3, Core4 RedHat Linux 7.3, 7.3 i386, 7.3 i686, 9.0 i386 RedHat Linux Advanced Work Station 2.1 S.u.S.E. Linux 9.1, 9.1 x86_64 S.u.S.E. Linux Personal 9.2, 9.2 x86_64, 9.3, 9.3 x86_64, 10.0 OSS S.u.S.E. Linux Professional 9.1, 9.1 x86_64, 9.2, 9.2 x86_64, 9.3, 9.3 x86_64, 10.0, 10.0 OSS SGI ProPack 3.0 SP6 Sun Java Desktop System (JDS) 2.0 Sun Solaris 10.0, 10.0_x86 Ubuntu Ubuntu Linux 4.1 ia32, 4.1 ia64, 4.1 ppc, 5.0 4 amd64, 5.0 4 i386, 5.0 4 powerpc, 5.10 amd64, 5.10 i386, 5.10 powerpc Response Please see the referenced vendor advisories for details on obtaining and applying fixes. Mozilla Browser 1.6: Mandriva Upgrade libnspr4-1.7.8-0.7.C30mdk.i586.rpm Mandriva Upgrade libnspr4-devel-1.7.8-0.7.C30mdk.i586.rpm Mandriva Upgrade libnss3-1.7.8-0.7.C30mdk.i586.rpm Mandriva Upgrade libnss3-devel-1.7.8-0.7.C30mdk.i586.rpm Mandriva Upgrade mozilla-1.7.8-0.7.C30mdk.i586.rpm Mandriva Upgrade mozilla-devel-1.7.8-0.7.C30mdk.i586.rpm Mandriva Upgrade mozilla-dom-inspector-1.7.8-0.7.C30mdk.i586.rpm Mandriva Upgrade mozilla-enigmail-1.7.8-0.7.C30mdk.i586.rpm Mandriva Upgrade mozilla-enigmime-1.7.8-0.7.C30mdk.i586.rpm Mandriva Upgrade mozilla-irc-1.7.8-0.7.C30mdk.i586.rpm Mandriva Upgrade mozilla-js-debugger-1.7.8-0.7.C30mdk.i586.rpm Mandriva Upgrade mozilla-mail-1.7.8-0.7.C30mdk.i586.rpm Mandriva Upgrade mozilla-spellchecker-1.7.8-0.7.C30mdk.i586.rpm Mandriva Upgrade lib64nspr4-1.7.8-0.7.C30mdk.x86_64.rpm Mandriva Upgrade lib64nspr4-devel-1.7.8-0.7.C30mdk.x86_64.rpm Mandriva Upgrade lib64nss3-1.7.8-0.7.C30mdk.x86_64.rpm Mandriva Upgrade lib64nss3-devel-1.7.8-0.7.C30mdk.x86_64.rpm Mandriva Upgrade mozilla-1.7.8-0.7.C30mdk.x86_64.rpm Mandriva Upgrade mozilla-devel-1.7.8-0.7.C30mdk.x86_64.rpm Mandriva Upgrade mozilla-dom-inspector-1.7.8-0.7.C30mdk.x86_64.rpm Mandriva Upgrade mozilla-enigmail-1.7.8-0.7.C30mdk.x86_64.rpm Mandriva Upgrade mozilla-enigmime-1.7.8-0.7.C30mdk.x86_64.rpm Mandriva Upgrade mozilla-irc-1.7.8-0.7.C30mdk.x86_64.rpm Mandriva Upgrade mozilla-js-debugger-1.7.8-0.7.C30mdk.x86_64.rpm Mandriva Upgrade mozilla-mail-1.7.8-0.7.C30mdk.x86_64.rpm Mandriva Upgrade mozilla-spellchecker-1.7.8-0.7.C30mdk.x86_64.rpm Mandriva Upgrade libnspr4-1.0.6-16.4.20060mdk.i586.rpm Mandriva Upgrade libnspr4-devel-1.0.6-16.4.20060mdk.i586.rpm Mandriva Upgrade libnss3-1.0.6-16.4.20060mdk.i586.rpm Mandriva Upgrade libnss3-devel-1.0.6-16.4.20060mdk.i586.rpm Mandriva Upgrade mozilla-firefox-1.0.6-16.4.20060mdk.i586.rpm Mandriva Upgrade mozilla-firefox-devel-1.0.6-16.4.20060mdk.i586.rpm Mandriva Upgrade lib64nspr4-1.0.6-16.4.20060mdk.x86_64.rpm Mandriva Upgrade lib64nspr4-devel-1.0.6-16.4.20060mdk.x86_64.rpm Mandriva Upgrade lib64nss3-1.0.6-16.4.20060mdk.x86_64.rpm Mandriva Upgrade lib64nss3-devel-1.0.6-16.4.20060mdk.x86_64.rpm Mandriva Upgrade lib64nss3-devel-1.0.6-16.4.20060mdk.x86_64.rpm Mandriva Upgrade mozilla-firefox-1.0.6-16.4.20060mdk.x86_64.rpm Mandriva Upgrade mozilla-firefox-devel-1.0.6-16.4.20060mdk.x86_64.rpm Mozilla Browser 1.7.8: RedHat Fedora Upgrade mozilla-1.7.12-1.5.2.ppc.rpm RedHat Fedora Upgrade mozilla-nspr-1.7.12-1.5.2.ppc.rpm RedHat Fedora Upgrade mozilla-nspr-devel-1.7.12-1.5.2.ppc.rpm RedHat Fedora Upgrade mozilla-nss-1.7.12-1.5.2.ppc.rpm RedHat Fedora Upgrade mozilla-nss-devel-1.7.12-1.5.2.ppc.rpm RedHat Fedora Upgrade mozilla-devel-1.7.12-1.5.2.ppc.rpm RedHat Fedora Upgrade mozilla-mail-1.7.12-1.5.2.ppc.rpm RedHat Fedora Upgrade mozilla-chat-1.7.12-1.5.2.ppc.rpm RedHat Fedora Upgrade mozilla-js-debugger-1.7.12-1.5.2.ppc.rpm RedHat Fedora Upgrade mozilla-dom-inspector-1.7.12-1.5.2.ppc.rpm RedHat Fedora Upgrade mozilla-debuginfo-1.7.12-1.5.2.ppc.rpm RedHat Fedora Upgrade mozilla-1.7.12-1.5.2.x86_64.rpm RedHat Fedora Upgrade mozilla-nspr-1.7.12-1.5.2.x86_64.rpm RedHat Fedora Upgrade mozilla-nspr-devel-1.7.12-1.5.2.x86_64.rpm RedHat Fedora Upgrade mozilla-nss-1.7.12-1.5.2.x86_64.rpm RedHat Fedora Upgrade mozilla-nss-devel-1.7.12-1.5.2.x86_64.rpm RedHat Fedora Upgrade mozilla-devel-1.7.12-1.5.2.x86_64.rpm RedHat Fedora Upgrade mozilla-mail-1.7.12-1.5.2.x86_64.rpm RedHat Fedora Upgrade mozilla-chat-1.7.12-1.5.2.x86_64.rpm RedHat Fedora Upgrade mozilla-js-debugger-1.7.12-1.5.2.x86_64.rpm RedHat Fedora Upgrade mozilla-dom-inspector-1.7.12-1.5.2.x86_64.rpm RedHat Fedora Upgrade mozilla-debuginfo-1.7.12-1.5.2.x86_64.rpm RedHat Fedora Upgrade mozilla-1.7.12-1.5.2.i386.rpm RedHat Fedora Upgrade mozilla-nspr-1.7.12-1.5.2.i386.rpm RedHat Fedora Upgrade mozilla-nspr-devel-1.7.12-1.5.2.i386.rpm RedHat Fedora Upgrade mozilla-nss-1.7.12-1.5.2.i386.rpm RedHat Fedora Upgrade mozilla-nss-devel-1.7.12-1.5.2.i386.rpm RedHat Fedora Upgrade mozilla-nss-devel-1.7.12-1.5.2.i386.rpm RedHat Fedora Upgrade mozilla-devel-1.7.12-1.5.2.i386.rpm RedHat Fedora Upgrade mozilla-mail-1.7.12-1.5.2.i386.rpm RedHat Fedora Upgrade mozilla-chat-1.7.12-1.5.2.i386.rpm RedHat Fedora Upgrade mozilla-js-debugger-1.7.12-1.5.2.i386.rpm RedHat Fedora Upgrade mozilla-dom-inspector-1.7.12-1.5.2.i386.rpm RedHat Fedora Upgrade mozilla-debuginfo-1.7.12-1.5.2.i386.rpm Mozilla Firefox Preview Release: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 0.8: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 0.9: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 0.9 rc: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 0.9.1: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 0.9.2: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 0.9.3: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 0.10 : Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 0.10.1: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 1.0: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 1.0.1: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 1.0.2: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 1.0.3: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 1.0.4: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 1.0.5: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 1.0.5: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 1.0.6: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 1.0.7: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 1.5: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 1.5 beta 1: Mozilla Upgrade Firefox 1.5.0.1 Mozilla Firefox 1.5 beta 2: Mozilla Upgrade Firefox 1.5.0.1 Mozilla SeaMonkey 1.0 dev: Mozilla Upgrade SeaMonkey 1.0 Sun Solaris 10.0: Sun Patch 119115-19 Sun Solaris 10.0 _x86: Sun Patch 119116-19
WebAttackMozillaFirefoxThunderbirdSeaMonkeyCVE-2013-1710 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt of leveraging a vulnerability in Mozilla Firefox/Thunderbird/SeaMonkey which may leads to arbitrary code execution. Additional Information Firefox is a browser. SeaMonkey is a suite of applications that includes a browser and an email client. Thunderbird is an email client. All three applications are available for multiple platforms. The applications are prone to a remote code execution vulnerability. Specifically, this issue occurs when generating a Certificate Request Message Format (CRMF) request. Attackers can exploit this vulnerability to execute arbitrary code in the context of the user running the vulnerable application, execute arbitrary script code in the browser of an unsuspecting user in the context of a targeted site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Affected Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20.
WebAttackMozillaFirefoxThunderbirdSeaMonkeyCVE-2014-1510 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts of leveraging a privilege-escalation vulnerability in Mozilla Firefox, SeaMonkey, and Thunderbird which could result in gaining elevated privileges and perform unauthorized actions. Additional Information Firefox is a browser. SeaMonkey is a suite of applications that includes a browser and an email client. Thunderbird is an email client. All three applications are available for multiple platforms. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to privilege-escalation vulnerability. This issue occurs when loading an untrusted content from chrome privileged page by getting JavaScript implemented WebIDL and calls functions related to browsers. Remote attackers can exploit this issue to gain elevated privileges and perform unauthorized actions. Affected These issues are fixed in: Firefox 28 Firefox ESR 24.4 Thunderbird 24.4 Seamonkey 2.25
WebAttackMozillaFirefoxUTF-8CVE-2008-0016 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a buffer overflow vulnerability in Firefox which may result in remote code execution. Additional Information Mozilla Firefox is a web browser available for multiple platforms. SeaMonkey is an all-in-one application suite. Firefox and SeaMonkey are prone to a stack-based buffer-overflow vulnerability. This issue affects URI parsing. Attackers can exploit this issue with a specially crafted UTF-8 URI in a hyperlink. Very few technical details are currently unavailable. We will update this BID as soon as more information emerges. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. NOTE: This issue was originally documented in BID 31346 (Mozilla Firefox/SeaMonkey/Thunderbird Multiple Remote Vulnerabilities). It has been given its own record to better document the details. Affected Versions prior to Firefox 2.0.0.17 and prior to SeaMonkey 1.1.12 are vulnerable. Response Download and install all vendor patches related to this vulnerability.
WebAttackMozillamChannelCVE-2011-0065 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Mozilla Firefox and SeaMonkey are prone to a memory-corruption vulnerability that may allow remote code execution. An attacker can exploit this issue by enticing an unsuspecting user into viewing malicious content. A successful exploit will result in the execution of attacker-supplied code where user may run the affected application. Failed exploit attempts will likely result in denial-of-service conditions. This issue is fixed in: Firefox 3.6.17 Firefox 3.5.19 SeaMonkey 2.0.14 . Additional Information Firefox is a browser. SeaMonkey is a suite of applications that includes a browser and an email client. Both applications are available for multiple platforms. Mozilla Firefox and SeaMonkey are prone to a memory-corruption vulnerability that may allow remote code execution. Specifically, when an Object element has no 'mChannel' object assigned to it and the 'OnChannelRedirect' method is invoked, an attacker can point the method to an arbitrary object as the channel in use. The affected object will then turn into a dangling pointer, which may allow attackers to corrupt memory and execute arbitrary code. An attacker can exploit this issue by enticing an unsuspecting user into viewing malicious content. A successful exploit will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. This issue is fixed in: Firefox 3.6.17 Firefox 3.5.19 SeaMonkey 2.0.14 NOTE: This issue was previously discussed in BID 47635 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2011-12 through -18 Multiple Vulnerabilities) but has been moved to its own record to better document it. Affected An attacker may be able to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Response The following exploits are available:
WebAttackMSCMSInformationDisclosureVulnerability Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to remotely exploit a vulnerability in Microsoft Content Management Server software which could result in information disclosure. Additional Information A cross-site scripting vulnerability exists in Microsoft Content Management Server (MCMS). The vulnerability could allow the injection of a client-side script in the user's browser. The HTTP response splitting vulnerability (a form of XSS) exists in MCMS's "/NR/System/Access/DefaultGuestLogin.asp" page. The vulnerability arises because MCMS takes data sent to the server by the user and uses some of that data in the response header sent back to the browser without proper validation. Affected Microsoft Content Management Server 2001 SP1 Microsoft Content Management Server 2002 SP2 Response Upgrade to the latest version of Microsoft Content Management Server software and ensure that all patches are applied.
WebAttackMSDLLHijackingActivity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit the DLL Hijacking vulnerability in Microsoft Windows OS. Additional Information DLL Hijacking attack exploits the way Windows applications search and load Dynamic Link Libraries. Affected Various Windows platforms Response NA
WebAttackMSDLLHijackingActivity2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit the DLL Hijacking vulnerability in Microsoft Windows OS. Additional Information DLL Hijacking attack exploits the way Windows applications search and load Dynamic Link Libraries. Affected Various Windows platforms Response NA
Web Attack: MSDT Remote Code Execution CVE-2022-30190 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulneraibility in Microsoft Windows Support Diagnostic Tool. Additional Information A vulnerability exists in Microsoft Windows Support Diagnostic Tool (MSDT) that can lead to execution of arbitrary code. Affected Various Windows machines. Response
WebAttackMSEDGECVE-2017-0227 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSEDGECVE-2017-0228 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows IE and Edge Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSEDGECVE-2017-0240 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSEdgeCVE-2017-8605 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote memory corruption vulnerability in Microsoft Edge Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the scripting engines fail to properly handle objects in memory. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Edge.
WebAttackMSEdgeCVE-2017-8617 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Edge Additional Information Microsoft Edge is a web browser available for Microsoft Windows. Microsoft Edge is prone to a remote code-execution vulnerability because the scripting engines fail to properly handle objects in memory. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. This could allow the attackers to obtain information to further compromise the user system. Affected Microsoft Edge.
WebAttackMSEDGECVE-2017-8731 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Microsoft Edge is a web browser available for Windows. Microsoft Edge is prone to a remote memory-corruption vulnerability because it fails to properly access objects in memory. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Windows product
WebAttackMSEDGECVE-2018-8275 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This Signature detects attempts of exploiting CVE-2018-8275 Remote Memory Corruption Vulnerability in MS Edge Additional Information Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected MS Edge
WebAttackMSEDGECVE-2018-8279 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt of CVE-2018-8279 exploitation. Remote Memory Corruption Vulnerability. Additional Information Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Edge
WebAttackMSEDGECVE-2018-8296 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to exploit CVE-2018-8296 Remote Memory Corruption Vulnerability Additional Information Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Internet Explorer
WebAttackMSFrontPageRemoteDebug Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a flaw in Microsoft Frontpage Server Extension's Remote Debugging interface through a specially crafted URI. Additional Information FrontPage Server Extensions are a component for FrontPage that allows authorized users to edit and maintain content. FrontPage Server Extensions includes remote debugging functionality, allowing users to connect to the server to debug content using software such as Visual Interdev. A remotely exploitable buffer overflow vulnerability has been reported in the remote debugging functionality provided by the software. This issue is due to an unchecked buffer size in a .DLL (fp30reg.dll) included with the extensions. It is possible to trigger this issue by sending a malformed chunked-encoded HTTP POST request. This will allow the attacker to influence the values in the ECX and EDI registers, which may be leveraged to execute arbitrary code. Exploitation may allow a remote attacker to execute arbitrary code on a vulnerable system with Local System privileges. Affected Microsoft FrontPage Server Extensions 2000 Microsoft FrontPage Server Extensions 2002 Microsoft SharePoint Team Services 2002 Microsoft Windows 2000 Advanced Server SP2, SP3 Microsoft Windows 2000 Datacenter Server SP2, SP3 Microsoft Windows 2000 Professional SP2, SP3 Microsoft Windows 2000 Server SP2, SP3 Microsoft Windows XP 64-bit Edition SP1 Microsoft Windows XP Home SP1 Microsoft Windows XP Professional SP1 Response Microsoft has released updates to address this issue.
WebAttackMSFrontPageRemoteDebugCAN-2003-0822 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a flaw in Microsoft Frontpage Server Extension's Remote Debugging interface through a specially crafted URI. Additional Information FrontPage Server Extensions are a component for FrontPage that allows authorized users to edit and maintain content. FrontPage Server Extensions includes remote debugging functionality, allowing users to connect to the server to debug content using software such as Visual Interdev. A remotely exploitable buffer overflow vulnerability has been reported in the remote debugging functionality provided by the software. This issue is due to an unchecked buffer size in a .DLL (fp30reg.dll) included with the extensions. It is possible to trigger this issue by sending a malformed chunked-encoded HTTP POST request. This will allow the attacker to influence the values in the ECX and EDI registers, which may be leveraged to execute arbitrary code. Exploitation may allow a remote attacker to execute arbitrary code on a vulnerable system with Local System privileges. Affected Microsoft FrontPage Server Extensions 2000 Microsoft FrontPage Server Extensions 2002 Microsoft SharePoint Team Services 2002 Microsoft Windows 2000 Advanced Server SP2, SP3 Microsoft Windows 2000 Datacenter Server SP2, SP3 Microsoft Windows 2000 Professional SP2, SP3 Microsoft Windows 2000 Server SP2, SP3 Microsoft Windows XP 64-bit Edition SP1 Microsoft Windows XP Home SP1 Microsoft Windows XP Professional SP1 Response Microsoft has released updates to address this issue.
WebAttackMSFrontPageSmartHTMLDenialofServiceVulnerability Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects an attempt to conduct a Denial of Service against the SmartHTML Interpreter Frontpage Server Extension. Additional Information FrontPage Server Extensions are a component for FrontPage that allows authorized users to edit and maintain content. FrontPage Server Extensions include the SmartHTML interpreter, which allows web pages to access various FrontPage features. A denial of service vulnerability has been reported in the SmartHTML interpreter that may be exploited by remote attackers. It is possible to send an invalid request that will cause the interpreter to cycle, denying availability of CPU resources. In this manner, it is possible to cause a denial of service by exhausting available resources on the system. Affected Microsoft FrontPage Server Extensions 2000 Microsoft FrontPage Server Extensions 2002 Microsoft SharePoint Team Services 2002 Microsoft Windows 2000 Advanced Server SP2, SP3 Microsoft Windows 2000 Datacenter Server SP2, SP3 Microsoft Windows 2000 Professional SP2, SP3 Microsoft Windows 2000 Server SP2, SP3 Microsoft Windows XP 64-bit Edition SP1 Microsoft Windows XP Home SP1 Microsoft Windows XP Professional SP1 Response Microsoft has released updates to address this issue. Microsoft FrontPage Server Extensions 2000: Microsoft Upgrade Security Update for Microsoft FrontPage Server Extensions 2000 http://www.microsoft.com/downloads/details.aspx?FamilyId=C84C3D10-A821-4819-BF58-D3BC70A77BFA&displaylang=en Microsoft FrontPage Server Extensions 2002: Microsoft Upgrade FrontPage 2002 Server Extensions Security Patch: KB813380 http://www.microsoft.com/downloads/details.aspx?FamilyId=3E8A21D9-708E-4E69-8299-86C49321EE25&displaylang=en Microsoft SharePoint Team Services 2002: Microsoft Upgrade Office XP Web Services Security Patch: KB812708 http://www.microsoft.com/downloads/details.aspx?FamilyId=5923FC2F-D786-4E32-8F15-36A1C9E0A340&displaylang=en Microsoft Windows 2000 Advanced Server SP2: Microsoft Upgrade Security Update for Windows 2000: KB810217 http://www.microsoft.com/downloads/details.aspx?FamilyId=057D5F0E-0E2B-47D2-9F0F-3B15DD8622A2&displaylang=en Microsoft Windows 2000 Advanced Server SP3: Microsoft Upgrade Security Update for Windows 2000: KB810217 http://www.microsoft.com/downloads/details.aspx?FamilyId=057D5F0E-0E2B-47D2-9F0F-3B15DD8622A2&displaylang=en Microsoft Windows 2000 Professional SP2: Microsoft Upgrade Security Update for Windows 2000: KB810217 http://www.microsoft.com/downloads/details.aspx?FamilyId=057D5F0E-0E2B-47D2-9F0F-3B15DD8622A2&displaylang=en Microsoft Windows 2000 Professional SP3: Microsoft Upgrade Security Update for Windows 2000: KB810217 http://www.microsoft.com/downloads/details.aspx?FamilyId=057D5F0E-0E2B-47D2-9F0F-3B15DD8622A2&displaylang=en Microsoft Windows 2000 Server SP2: Microsoft Upgrade Security Update for Windows 2000: KB810217 http://www.microsoft.com/downloads/details.aspx?FamilyId=057D5F0E-0E2B-47D2-9F0F-3B15DD8622A2&displaylang=en Microsoft Windows 2000 Server SP3: Microsoft Upgrade Security Update for Windows 2000: KB810217 http://www.microsoft.com/downloads/details.aspx?FamilyId=057D5F0E-0E2B-47D2-9F0F-3B15DD8622A2&displaylang=en Microsoft Windows XP Home SP1: Microsoft Upgrade Security Update for Windows XP: KB810217 http://www.microsoft.com/downloads/details.aspx?FamilyId=9B302532-BFAB-489B-82DC-ED1E49A16E1C&displaylang=en Microsoft Windows XP Professional SP1: Microsoft Upgrade Security Update for Windows XP: KB810217 http://www.microsoft.com/downloads/details.aspx?FamilyId=9B302532-BFAB-489B-82DC-ED1E49A16E1C&displaylang=en
Web Attack: MSH.Bluwimps Download 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files. Additional Information MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files. Affected Windows OS Response
WebAttackMSH.BluwimpsDownload4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files. Additional Information MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files. Affected Windows OS Response
WebAttackMSH.BluwimpsDownload5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files. Additional Information MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files. Affected Windows OS Response
WebAttackMSH.BluwimpsDownload6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files. Additional Information MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files. Affected Windows OS Response
WebAttackMSIE&EdgeCVE-2017-8750 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote memory corruption vulnerability in Microsoft Internet Explorer and Edge. Additional Information Microsoft Internet Explorer and Edge are prone to a remote memory-corruption vulnerability because it fails to properly handle objects in memory. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Internet Explorer 11 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 Version 1607 for 32-bit Systems 0 + Microsoft Windows 10 Version 1607 for x64-based Systems 0 + Microsoft Windows 10 version 1703 for 32-bit Systems 0 + Microsoft Windows 10 version 1703 for x64-based Systems 0 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 8.1 for 32-bit Systems 0 + Microsoft Windows 8.1 for 32-bit Systems 0 + Microsoft Windows 8.1 for 32-bit Systems 0 + Microsoft Windows 8.1 for x64-based Systems 0 + Microsoft Windows 8.1 for x64-based Systems 0 + Microsoft Windows 8.1 for x64-based Systems 0 + Microsoft Windows Rt 8.1 - + Microsoft Windows Rt 8.1 - + Microsoft Windows Rt 8.1 - + Microsoft Windows Server 2016 + Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2 + Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2012 R2 0 + Microsoft Windows Server 2012 R2 0 + Microsoft Windows Server 2012 R2 0 Microsoft Edge 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 Version 1607 for 32-bit Systems 0 + Microsoft Windows 10 Version 1607 for x64-based Systems 0 + Microsoft Windows Server 2016 for x64-based Systems 0
WebAttackMSIE7UninitializedMemoryCodeExec Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a uninitialized memory corruption vulnerability in Internet Explorer which may result in remote code execution. Additional Information A remote code execution vulnerability exists in the way Internet Explorer accesses an object that has been deleted. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2009-0075. Affected Internet Explorer 7 Response Download and install all vendor patches related to this vulnerability.
WebAttackMSIEAdobeReaderTIFFFileCVE-2010-0188 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to exploit a remote code execution vulnerability in Adobe Acrobat. Additional Information Adobe Reader and Acrobat are applications for handling PDF files. Adobe Acrobat and Reader are prone to an unspecified remote code-execution vulnerability. Technical details are currently unavailable. We will update this BID as soon as more information emerges. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. The following products are affected: Reader 9.3 for Windows, Macintosh, and UNIX Acrobat 9.3 for Windows and Macintosh Reader 8.2 for Windows and Macintosh Acrobat 8.2 for Windows and Macintosh NOTE: This BID was originally titled 'Adobe Acrobat and Reader APSB10-07 Unspecified Security Vulnerabilities' but has been updated with the release of the Adobe patches. NOTE (February 19, 2010): Reports indicate that this issue may be related to the vulnerability discussed in BID 19283 (LibTIFF TiffFetchShortPair Remote Buffer Overflow Vulnerability). We will update this BID as more information emerges. Affected Adobe Acrobat Response Updates are available. Please see the references for details.
WebAttackMSIEClonedDOMObjectCVE-2010-0248 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a browser for the Windows operating system. Internet Explorer is prone to a remote code-execution vulnerability that arises when the browser displays a malicious webpage. This issue occurs because of an error when accessing an object that has been incorrectly initialized or deleted. Specifically, this error is related to the handling of cloned DOM (Document Object Model) objects in JavaScript. An attacker can exploit this issue by enticing an unsuspecting user into viewing a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code in the context of the user running the application, which can compromise the application and possibly the computer. Failed attacks may cause denial-of-service conditions. Affected Microsoft Internet Explorer
WebAttackMSIECloneNodeUse-After-FreeCVE-2012-2557 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue occurs because the application accesses an object in memory that has not been correctly initialized or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 7 and 8 are affected. Affected Microsoft Internet Explorer versions 7 and 8.
WebAttackMSIECommonControlsActiveXCVE-2012-0158 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Windows Common Controls. Additional Information Microsoft Windows Common Control Library is used by Windows Explorer to create controls such as list view, header, tree tip, tooltip, tool bar, status bar, etc. The application is prone to a remote code-execution vulnerability. Specifically, this issue affects 'MSCOMCTL.TreeView', 'MSCOMCTL.ListView2', 'MSCOMCTL.TreeView2', and 'MSCOMCTL.ListView' ActiveX controls contained in the 'MSCOMCTL.OCX' file. The controls are identified by the following CLSIDs: bdd1f04b-858b-11d1-b16a-00c0f0283628 996BF5E0-8044-4650-ADEB-0B013914E99C C74190B6-8589-11d1-B16A-00C0F0283628 9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code within the context of the application (typically Internet Explorer) that uses the ActiveX control. Affected Microsoft Visual FoxPro 9.0 SP2 Microsoft Visual FoxPro 9.0 SP1 Microsoft Visual FoxPro 8.0 SP1 Microsoft Visual FoxPro 8.0 Microsoft Visual Basic 6.0 - Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0 Microsoft SQL Server 2008 x64 SP3 Microsoft SQL Server 2008 x64 SP2 Microsoft SQL Server 2008 itanium SP3 Microsoft SQL Server 2008 itanium SP2 Microsoft SQL Server 2008 itanium SP1 Microsoft SQL Server 2008 itanium R2 Microsoft SQL Server 2008 32-bit SP3 Microsoft SQL Server 2008 32-bit SP2 Microsoft SQL Server 2008 32-bit R2 Microsoft SQL Server 2008 R2 SP1 Microsoft SQL Server 2008 R2 Microsoft SQL Server 2008 0 Microsoft SQL Server 2005 x64 Edition SP4 Microsoft SQL Server 2005 x64 Edition SP3 Microsoft SQL Server 2005 x64 Edition SP2 Microsoft SQL Server 2005 x64 Edition SP1 Microsoft SQL Server 2005 Itanium Edition SP4 Microsoft SQL Server 2005 Itanium Edition SP3 Microsoft SQL Server 2005 Itanium Edition SP2 Microsoft SQL Server 2005 Itanium Edition SP1 Microsoft SQL Server 2005 Itanium Edition 0 Microsoft SQL Server 2005 Express Edition SP4 Microsoft SQL Server 2005 Express Edition SP3 Microsoft SQL Server 2005 Express Edition SP2 Microsoft SQL Server 2005 Express Edition SP1 Microsoft SQL Server 2000 SP4 Microsoft SQL Server 2000 SP3 Microsoft SQL Server 2000 SP2 Microsoft SQL Server 2000 SP1 - Microsoft Windows 2000 Professional SP2 - Microsoft Windows 2000 Professional SP1 - Microsoft Windows 2000 Professional - Microsoft Windows NT 4.0 SP6a - Microsoft Windows NT 4.0 SP6 - Microsoft Windows NT 4.0 SP5 Microsoft SQL Server 2000 - Microsoft Windows 2000 Professional SP2 - Microsoft Windows 2000 Professional SP1 - Microsoft Windows 2000 Professional - Microsoft Windows NT 4.0 SP6a - Microsoft Windows NT 4.0 SP6 - Microsoft Windows NT 4.0 SP5 - Microsoft Windows NT 4.0 Microsoft Office 2010 (32-bit edition) 0 Microsoft Office 2010 0 Microsoft Office 2010 (32-bit edition) SP1 Microsoft Office 2007 SP2 Microsoft Office 2007 SP1 Microsoft Office 2003 Web Components SP3 Microsoft Office 2003 SP3 Microsoft Office 2003 SP2 Microsoft Office 2003 SP1 Microsoft Commerce Server 2009 R2 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2009 0 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 SP2 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 SP1 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2007 0 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Server SP2 Microsoft Commerce Server 2002 SP4 Microsoft Commerce Server 2002 SP3 Microsoft Commerce Server 2002 SP2 Microsoft Commerce Server 2002 SP1 Microsoft BizTalk Server 2002 SP1 - Microsoft Windows 2000 Advanced Server SP2 - Microsoft Windows 2000 Advanced Server SP1 - Microsoft Windows 2000 Advanced Server - Microsoft Windows 2000 Server SP2 - Microsoft Windows 2000 Server SP1 - Microsoft Windows 2000 Server
WebAttackMSIECSSTagCVE-2010-3962 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a suspicious web page which may result in compromise of the host machine resulting in remote code execution. Additional Information This signature detects a suspicious web page which may result in compromise of the host machine resulting in remote code execution. Affected Microsoft Internet Explorer 6.0, 7.0 Response Download and install all vendor patches for this vulnerability.
WebAttackMSIECVE-2010-0249 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Internet Explorer is a browser for the Microsoft Windows operating system. Internet Explorer is prone to a remote code-execution vulnerability. The issue is caused by a memory-corruption error triggered by an invalid pointer to a deleted object. Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the user running the browser. Successful exploits will compromise the application and possibly the computer. Failed attacks will cause denial-of-service conditions. Affected Microsoft Internet Explorer Response Download and install all vendor patches related to this vulnerability.
WebAttackMSIECVE-2010-3962 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a suspicious web page which may result in compromise of the host machine resulting in remote code execution. Additional Information Microsoft Internet Explorer is a web browser available for Microsoft Windows platforms. Internet Explorer is prone to a remote code-execution vulnerability. This issue occurs when storing a certain combination of Cascading Style Sheet (CSS) tags and can result in a user-after-free condition. An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Affected Microsoft Internet Explorer 6.0, 7.0 Response Download and install all vendor patches related to this vulnerability
WebAttackMSIECVE-2011-1260 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Internet Explorer. Additional Information Microsoft Internet Explorer is a web browser available for Microsoft Windows platforms. Microsoft Internet Explorer is prone to a remote code-execution vulnerability because of a use-after-free error. This issue occurs when the application attempts to access an object that is not properly initialized or has been deleted. Specifically, this issue affects the 'layout-grid-char' style property. An attacker can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the affected application. Failed attacks will cause denial-of-service conditions. Affected Various Windows platforms Response NA
WebAttackMSIECVE-2012-1526 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer Additional Information A remote code execution vulnerability exists in Microsoft Internet Explorer that can be exploited to run arbitrary code. Affected Microsoft Internet Explorer
WebAttackMSIECVE-2012-1879 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer Additional Information A memory corruption vulnerability in Microsoft Internet Explorer may lead to remote code execution Affected Internet Explorer
WebAttackMSIECVE-2012-18792 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer Additional Information A memory corruption vulnerability in Microsoft Internet Explorer may lead to remote code execution Affected Internet Explorer
WebAttackMSIECVE-2012-2521 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer Additional Information A remote code execution vulnerability exists in Microsoft Internet Explorer that can be exploited to run arbitrary code. Affected Microsoft Internet Explorer
WebAttackMSIECVE-2012-2522 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information A vulnerability exists in Microsoft Internet Explorer when handling certain DOM operations. This may lead to crash or remote code execution. Affected Microsoft Internet Explorer
WebAttackMSIECVE-2012-4792 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, and 8 are affected. Affected Microsoft Internet Explorer versions 6, 7, and 8 are affected.
WebAttackMSIECVE-2012-47922 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, and 8 are affected. Affected Microsoft Internet Explorer versions 6, 7, and 8 are affected.
Web Attack: MSIE CVE-2013-2551 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a vulnerability in Microsoft Internet Explorer which may result in remote code execution. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer 6, 7, 8 ,9, and 10
Web Attack: MSIE CVE-2013-2551 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a vulnerability in Microsoft Internet Explorer which may result in remote code execution. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer 6, 7, 8 ,9, and 10
Web Attack: MSIE CVE-2013-2551 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a vulnerability in Microsoft Internet Explorer which may result in remote code execution. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer 6, 7, 8 ,9, and 10
WebAttackMSIECVE-2013-25514 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a vulnerability in Microsoft Internet Explorer which may result in remote code execution. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer 6, 7, 8 ,9, and 10
Web Attack: MSIE CVE-2013-2551 6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a vulnerability in Microsoft Internet Explorer which may result in remote code execution. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer 6, 7, 8 ,9, and 10
WebAttackMSIECVE-2014-0274 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-0275 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-0278 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-0281 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-0289 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-0290 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-1805 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-2820 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-2824 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-4063 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-4088 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-4089 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-4092 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-4094 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-4127 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-4130 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-4136 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-4141 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-4144 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-6330 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-6339 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-6348 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-6369 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-6370 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2014-8967 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a web browser available for multiple platforms. Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Specifically, this issue occurs because, when applying CSS style of 'display:run-in' to a page can cause an object's reference count to fall to zero prematurely, causing the object to be freed. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition. Affected Microsoft Internet Explorer
WebAttackMSIECVE-2015-0019 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-0039 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-0041 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-0044 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-0046 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-0048 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-0049 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-00532 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-0069 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-0072 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to bypass Same Origin Policy in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is prone to a Same Origin Policy(SOP) bypass vulnerability. Attackers can steal anything from another domain, and inject anything into another domain. Affected Microsoft Internet Explorer.
WebAttackMSIECVE-2015-00722 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to bypass Same Origin Policy in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is prone to a Same Origin Policy(SOP) bypass vulnerability. Attackers can steal anything from another domain, and inject anything into another domain. Affected Microsoft Internet Explorer.
WebAttackMSIECVE-2015-0081 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1685 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1687 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1689 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1691 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1706 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1708 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1709 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote memory corruption vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the application fails to properly access objects in memory. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Internet Explorer 8, 9, 10 and 11 are vulnerable. Affected Internet Explorer 8, 9, 10 and 11.
WebAttackMSIECVE-2015-1710 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.