text
stringlengths 0
383k
|
---|
WebAttackMozillaFirefoxCVE-2018-18500Activity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the browser, gain elevated privileges, or cause denial-of-service conditions.
Additional Information
Firefox is a browser and available for multiple platforms.
Mozilla Firefox is prone to the following security vulnerabilities:
1. A use-after-free denial-of-service vulnerability that occurs when handling a specially-crafted HTML5 stream. An attacker can exploit this issue to free stream parser object. [CVE-2018-18500]
2. A privilege-escalation vulnerability that occurs due to insufficient authentication during the communication between IPC endpoints and server parents. An attacker can exploit this issue escape sandbox by using specially-crafted messages in the listener process. [CVE-2018-18505]
3. Multiple security vulnerabilities. Specifically, these issues occur because of memory safety bugs. [CVE-2018-18501]
Attackers can exploit these issues to execute arbitrary code in the context of the browser, gain elevated privileges; or cause denial-of-service conditions.
Affected
Thunderbird before 60.5, Firefox ESR before 60.5, and Firefox before 65
|
WebAttackMozillaFirefoxCVE-2019-11697
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to bypass certain security restrictions to perform unauthorized actions, crash the application, execute arbitrary code or obtain sensitive information. Failed exploit attempts will likely result in denial-of-service conditions.
Additional Information
Firefox is a browser and available for multiple platforms.
Mozilla Firefox is prone to the following security vulnerabilities:
1. A security-bypass vulnerability. Specifically, this issue occurs because a custom cursor defined by scripting can position itself over the addressbar to spoof the actual cursor when it should not be allowed. [CVE-2019-11695]
2. A security vulnerability. Specifically, this issue occurs because '.JNLP' extensions files for 'Java web start' applications are not treated as executable content. This may allow attacker to mistakenly launch an executable binary locally. [CVE-2019-11696]
3. A security-bypass vulnerability. Specifically, this issue occurs when the key 'ALT' and 'a' is pressed, it will install the extension without the install prompt delay and that keeps the prompt visible to accept or decline installation by the user. [CVE-2019-11697]
4. A address bar spoofing vulnerability. Specifically, this issue occurs because it highlights the wrong domain name in the addressbar during page navigation. [CVE-2019-11699]
5. An arbitrary file-access vulnerability. An attacker can exploit this issue by using a hyperlink that uses the 'res:' protocol to open files at known location in Internet Explorer. [CVE-2019-11700]
Note: This issue only affects Windows.
6. A security vulnerability. Specifically, this issue occurs because default 'webcal:' protocol loads a website that is vulnerable cross-site scripting attacks. [CVE-2019-11701]
7. A security vulnerability. Specifically, these issues occur because of memory safety bugs. An attacker can exploit this issue to corrupt the memory and execute arbitrary code. [CVE-2019-9814]
8. A denial-of-service vulnerability that occurs due to a use-after-free error. Specifically, this issue affects the 'AssertWorkerThread' function. An attacker can exploit this issue to cause a crash. [CVE-2019-9821]
Attackers can exploit these issues to bypass certain security restrictions to perform unauthorized actions, crash the application, execute arbitrary code or obtain sensitive information. Failed exploit attempts will likely result in denial-of-service conditions.
Affected
Mozilla Firefox versions prior to 67
Mozilla Firefox ESR versions prior to 60.7
|
WebAttackMozillaFirefoxCVE-2019-11708
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects to exploit Security Bypass vulnerability on the affected product.
Additional Information
Mozilla Firefox and Firefox ESR are prone to a security-bypass vulnerability. Specifically, this issue occurs due to insufficient vetting of parameters passed with the 'Prompt:Open' IPC message between child and parent processes resulting in opening of an non-sandboxed parent process. This issue may lead to further execution of arbitrary code when used in conjunction with another vulnerability.
An attacker may leverage this issue to bypass certain security restrictions and perform unauthorized actions.
Affected
This vulnerability affects Firefox ESR prior to version 60.7.2, Firefox prior to version 67.0.4, and Thunderbird prior to version 60.7.2.
Response
Updates are available. Please see the references or vendor advisory for more information.
|
WebAttackMozillaFirefoxCVE-2019-17026
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Type Confusion Remote Code Execution vulnerability in the affected machines.
Additional Information
Mozilla Firefox is a web browser.
Mozilla Firefox and Firefox ESR are prone to a remote code-execution vulnerability due type confusion error. Specifically, this issue occurs with 'StoreElementHole' and 'FallibleStoreElement'. An attacker can exploit this issue to execute arbitrary code in the context of the currently logged-in user. This may allow an attacker to run code on a target system.
An attacker can exploit this issue to execute arbitrary code in the context of the application.
Affected
This vulnerability affects Firefox ESR prior to version 68.4.1, Thunderbird prior to version 68.4.1, and Firefox prior to version 72.0.1.
|
WebAttackMozillaFirefoxCVE-2019-9810Activity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute arbitrary code in the context of the browser, gain elevated privileges, or cause denial-of-service conditions.
Additional Information
Firefox is a browser and available for multiple platforms.
Incorrect alias information in IonMonkey JIT compiler for Array.prototype.slice method may lead to missing bounds check and a buffer overflow. The attacker can then execute arbitrary code in the context of the browser, gain elevated privileges, or cause denial-of-service conditions.
Affected
Firefox before 66.0.1, Firefox ESR before 60.6.1, and Thunderbird before 60.6.1.
Response
|
WebAttackMozillaFirefoxCVE-2020-12418
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Information Disclosure vulnerability on the affected machine.
Additional Information
Mozilla Firefox, Firefox ESR and Thunderbird are prone to an information-disclosure vulnerability. Manipulating individual parts of a URL object could have caused an out-of-bounds read, leaking process memory to malicious JavaScript.
Affected
Firefox ESR prior to version 68.10, Firefox prior to version 78, and Thunderbird prior to version 68.10.0.
Response
|
WebAttackMozillaFirefoxCVE-2020-15680
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Information Disclosure vulnerability on the affected machine.
Additional Information
Mozilla Firefox is prone to an information-disclosure vulnerability. If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered.
Affected
Firefox below version 82
Response
Update to the latest available version.
|
WebAttackMozillaFirefoxPDFJSPrivilegeEscalationCVE-2015-0816
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit Firefox PDF.js Privilege Escalation bug which may lead to arbitrary code execution.
Additional Information
This signature detects attempts to exploit Firefox PDF.js Privilege Escalation bug which may lead to arbitrary code execution.
Affected
Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6
|
WebAttackMozillaFirefoxRemoteCodeExecutionVulnerability
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in the Mozilla Firefox application by using a malformed SVG file.
Additional Information
Multiple Mozilla products are prone to multiple vulnerabilities. These issues include various memory-corruption, code-injection, and access-restriction-bypass vulnerabilities.
The following specific issues exist:
- An error in the JavaScript engine occurs when dealing with certain temporary variables during garbage collection. Successful exploitation may result in memory corruption and possibly the execution of arbitrary commands.
- A memory-corruption error occurs when dynamically changing the style of an element from 'position:relative' to 'position:static', causing Gecko to operate on freed memory. Successful exploitation may permit an attacker to execute arbitrary code. This issue does not affect Firefox 1.0 or Mozilla Suite 1.7.
- A problem occurs when calling the 'QueryInterface' method, part of the built-in Location and Navigator objects. A memory corruption occurs that may be exploited to run arbitrary code. This issue does not affect Firefox 1.0 or older Mozilla Suite 1.7. However, this issue may affect Thunderbird 1.5 if JavaScript is enabled in mail; this is not the default setting.
- The 'XULDocument.persist()' does not properly validate the attribute name. Exploitation may permit an attacker to inject XML into the 'localstore.rdf' that would be executed at startup. Thunderbird may be vulnerable to this issue if JavaScript is enabled in mail; this is not the default setting.
- An integer-overflow vulnerability exists in the new E4X, SVG, and Canvas features. The resultant memory corruption may permit the execution of arbitrary attacker-supplied code. These issues do not affect Firefox 1.0 or Mozilla Suite 1.7. Thunderbird 1.5 may be vulnerable if JavaScript is enabled in mail; this is not the default setting.
- A buffer-overflow vulnerability was introduced in an upgrade in the XML parser. Exploitation of this issue will likely crash the application. The execution of arbitrary code is likely not possible. Firefox 1.0 and Mozilla Suite 1.7 are not affected by this issue.
- An error in the E4X implementation exposes the internal 'AnyName' object to web content. An attacker may be able to exploit this issue to bypass same-origin restrictions that prevent direct access from one window frame to another. This issue does not affect Firefox 1.0 or Mozilla Suite 1.7. Thunderbird 1.5 may be vulnerable if JavaScript is enabled in mail; this is not the default setting.
Other undisclosed issues may have also been addressed in the various updated vendor applications.
Affected
Conectiva Linux 6.0, 7.0, 8.0
Debian Linux 3.1, 3.1 alpha, 3.1 amd64, 3.1 arm, 3.1 hppa, 3.1 ia-32, 3.1 ia-64, 3.1 m68k, 3.1 mips, 3.1 mipsel, 3.1 ppc, 3.1 s/390, 3.1 sparc
Gentoo Linux
HP HP-UX B.11.00, B.11.11, B.11.22, B.11.23
HP Tru64 5.1 A PK6, 5.1 A PK6 (BL24), 5.1 B PK4, 5.1 B-2 PK4, 5.1 B-2 PK4 (BL25)
MandrakeSoft Corporate Server 3.0, 3.0 x86_64
MandrakeSoft Linux Mandrake 8.0, 8.0 ppc, 2006.0, 2006.0 x86_64
Mozilla Browser 0.8, 0.9.2, 0.9.2.1, 0.9.3, 0.9.4, 0.9.4.1, 0.9.5, 0.9.6, 0.9.7, 0.9.8, 0.9.9, 0.9.35, 0.9.48, 1.0, 1.0 RC1, 1.0 RC2, 1.0.1, 1.0.2, 1.1, 1.1 Alpha, 1.1 Beta, 1.2, 1.2 Alpha, 1.2 Beta, 1.2.1, 1.3, 1.3.1, 1.4, 1.4 a, 1.4 b, 1.4.1, 1.4.2, 1.4.4, 1.5, 1.5.1, 1.6, 1.7, 1.7 alpha, 1.7 beta, 1.7 rc1, 1.7 rc2, 1.7 rc3, 1.7.1, 1.7.2, 1.7.3, 1.7.4, 1.7.5, 1.7.6, 1.7.7, 1.7.8, 1.7.9, 1.7.10, 1.7.11, 1.7.12
Mozilla Firefox Preview Release, 0.8, 0.9, 0.9 rc, 0.9.1, 0.9.2, 0.9.3, 0.10, 0.10.1, 1.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.5, 1.5 beta 1, 1.5 beta 2
Mozilla SeaMonkey 1.0 dev
Mozilla Thunderbird 0.6, 0.7, 0.7.1, 0.7.2, 0.7.3, 0.8, 0.9, 1.0, 1.0.1, 1.0.2, 1.0.5, 1.0.6, 1.0.7, 1.5, 1.5 beta 2
RedHat Advanced Workstation for the Itanium Processor 2.1, 2.1 IA64
RedHat Desktop 3.0, 4.0
RedHat Enterprise Linux AS 2.1, AS 2.1 IA64, AS 3, AS 4, ES 2.1, ES 2.1 IA64, ES 3, ES 4, WS 2.1, WS 2.1 IA64, WS 3, WS 4
RedHat Fedora Core1, Core2, Core3, Core4
RedHat Linux 7.3, 7.3 i386, 7.3 i686, 9.0 i386
RedHat Linux Advanced Work Station 2.1
S.u.S.E. Linux 9.1, 9.1 x86_64
S.u.S.E. Linux Personal 9.2, 9.2 x86_64, 9.3, 9.3 x86_64, 10.0 OSS
S.u.S.E. Linux Professional 9.1, 9.1 x86_64, 9.2, 9.2 x86_64, 9.3, 9.3 x86_64, 10.0, 10.0 OSS
SGI ProPack 3.0 SP6
Sun Java Desktop System (JDS) 2.0
Sun Solaris 10.0, 10.0_x86
Ubuntu Ubuntu Linux 4.1 ia32, 4.1 ia64, 4.1 ppc, 5.0 4 amd64, 5.0 4 i386, 5.0 4 powerpc, 5.10 amd64, 5.10 i386, 5.10 powerpc
Response
Please see the referenced vendor advisories for details on obtaining and applying fixes.
Mozilla Browser 1.6:
Mandriva Upgrade libnspr4-1.7.8-0.7.C30mdk.i586.rpm
Mandriva Upgrade libnspr4-devel-1.7.8-0.7.C30mdk.i586.rpm
Mandriva Upgrade libnss3-1.7.8-0.7.C30mdk.i586.rpm
Mandriva Upgrade libnss3-devel-1.7.8-0.7.C30mdk.i586.rpm
Mandriva Upgrade mozilla-1.7.8-0.7.C30mdk.i586.rpm
Mandriva Upgrade mozilla-devel-1.7.8-0.7.C30mdk.i586.rpm
Mandriva Upgrade mozilla-dom-inspector-1.7.8-0.7.C30mdk.i586.rpm
Mandriva Upgrade mozilla-enigmail-1.7.8-0.7.C30mdk.i586.rpm
Mandriva Upgrade mozilla-enigmime-1.7.8-0.7.C30mdk.i586.rpm
Mandriva Upgrade mozilla-irc-1.7.8-0.7.C30mdk.i586.rpm
Mandriva Upgrade mozilla-js-debugger-1.7.8-0.7.C30mdk.i586.rpm
Mandriva Upgrade mozilla-mail-1.7.8-0.7.C30mdk.i586.rpm
Mandriva Upgrade mozilla-spellchecker-1.7.8-0.7.C30mdk.i586.rpm
Mandriva Upgrade lib64nspr4-1.7.8-0.7.C30mdk.x86_64.rpm
Mandriva Upgrade lib64nspr4-devel-1.7.8-0.7.C30mdk.x86_64.rpm
Mandriva Upgrade lib64nss3-1.7.8-0.7.C30mdk.x86_64.rpm
Mandriva Upgrade lib64nss3-devel-1.7.8-0.7.C30mdk.x86_64.rpm
Mandriva Upgrade mozilla-1.7.8-0.7.C30mdk.x86_64.rpm
Mandriva Upgrade mozilla-devel-1.7.8-0.7.C30mdk.x86_64.rpm
Mandriva Upgrade mozilla-dom-inspector-1.7.8-0.7.C30mdk.x86_64.rpm
Mandriva Upgrade mozilla-enigmail-1.7.8-0.7.C30mdk.x86_64.rpm
Mandriva Upgrade mozilla-enigmime-1.7.8-0.7.C30mdk.x86_64.rpm
Mandriva Upgrade mozilla-irc-1.7.8-0.7.C30mdk.x86_64.rpm
Mandriva Upgrade mozilla-js-debugger-1.7.8-0.7.C30mdk.x86_64.rpm
Mandriva Upgrade mozilla-mail-1.7.8-0.7.C30mdk.x86_64.rpm
Mandriva Upgrade mozilla-spellchecker-1.7.8-0.7.C30mdk.x86_64.rpm
Mandriva Upgrade libnspr4-1.0.6-16.4.20060mdk.i586.rpm
Mandriva Upgrade libnspr4-devel-1.0.6-16.4.20060mdk.i586.rpm
Mandriva Upgrade libnss3-1.0.6-16.4.20060mdk.i586.rpm
Mandriva Upgrade libnss3-devel-1.0.6-16.4.20060mdk.i586.rpm
Mandriva Upgrade mozilla-firefox-1.0.6-16.4.20060mdk.i586.rpm
Mandriva Upgrade mozilla-firefox-devel-1.0.6-16.4.20060mdk.i586.rpm
Mandriva Upgrade lib64nspr4-1.0.6-16.4.20060mdk.x86_64.rpm
Mandriva Upgrade lib64nspr4-devel-1.0.6-16.4.20060mdk.x86_64.rpm
Mandriva Upgrade lib64nss3-1.0.6-16.4.20060mdk.x86_64.rpm
Mandriva Upgrade lib64nss3-devel-1.0.6-16.4.20060mdk.x86_64.rpm
Mandriva Upgrade lib64nss3-devel-1.0.6-16.4.20060mdk.x86_64.rpm
Mandriva Upgrade mozilla-firefox-1.0.6-16.4.20060mdk.x86_64.rpm
Mandriva Upgrade mozilla-firefox-devel-1.0.6-16.4.20060mdk.x86_64.rpm
Mozilla Browser 1.7.8:
RedHat Fedora Upgrade mozilla-1.7.12-1.5.2.ppc.rpm
RedHat Fedora Upgrade mozilla-nspr-1.7.12-1.5.2.ppc.rpm
RedHat Fedora Upgrade mozilla-nspr-devel-1.7.12-1.5.2.ppc.rpm
RedHat Fedora Upgrade mozilla-nss-1.7.12-1.5.2.ppc.rpm
RedHat Fedora Upgrade mozilla-nss-devel-1.7.12-1.5.2.ppc.rpm
RedHat Fedora Upgrade mozilla-devel-1.7.12-1.5.2.ppc.rpm
RedHat Fedora Upgrade mozilla-mail-1.7.12-1.5.2.ppc.rpm
RedHat Fedora Upgrade mozilla-chat-1.7.12-1.5.2.ppc.rpm
RedHat Fedora Upgrade mozilla-js-debugger-1.7.12-1.5.2.ppc.rpm
RedHat Fedora Upgrade mozilla-dom-inspector-1.7.12-1.5.2.ppc.rpm
RedHat Fedora Upgrade mozilla-debuginfo-1.7.12-1.5.2.ppc.rpm
RedHat Fedora Upgrade mozilla-1.7.12-1.5.2.x86_64.rpm
RedHat Fedora Upgrade mozilla-nspr-1.7.12-1.5.2.x86_64.rpm
RedHat Fedora Upgrade mozilla-nspr-devel-1.7.12-1.5.2.x86_64.rpm
RedHat Fedora Upgrade mozilla-nss-1.7.12-1.5.2.x86_64.rpm
RedHat Fedora Upgrade mozilla-nss-devel-1.7.12-1.5.2.x86_64.rpm
RedHat Fedora Upgrade mozilla-devel-1.7.12-1.5.2.x86_64.rpm
RedHat Fedora Upgrade mozilla-mail-1.7.12-1.5.2.x86_64.rpm
RedHat Fedora Upgrade mozilla-chat-1.7.12-1.5.2.x86_64.rpm
RedHat Fedora Upgrade mozilla-js-debugger-1.7.12-1.5.2.x86_64.rpm
RedHat Fedora Upgrade mozilla-dom-inspector-1.7.12-1.5.2.x86_64.rpm
RedHat Fedora Upgrade mozilla-debuginfo-1.7.12-1.5.2.x86_64.rpm
RedHat Fedora Upgrade mozilla-1.7.12-1.5.2.i386.rpm
RedHat Fedora Upgrade mozilla-nspr-1.7.12-1.5.2.i386.rpm
RedHat Fedora Upgrade mozilla-nspr-devel-1.7.12-1.5.2.i386.rpm
RedHat Fedora Upgrade mozilla-nss-1.7.12-1.5.2.i386.rpm
RedHat Fedora Upgrade mozilla-nss-devel-1.7.12-1.5.2.i386.rpm
RedHat Fedora Upgrade mozilla-nss-devel-1.7.12-1.5.2.i386.rpm
RedHat Fedora Upgrade mozilla-devel-1.7.12-1.5.2.i386.rpm
RedHat Fedora Upgrade mozilla-mail-1.7.12-1.5.2.i386.rpm
RedHat Fedora Upgrade mozilla-chat-1.7.12-1.5.2.i386.rpm
RedHat Fedora Upgrade mozilla-js-debugger-1.7.12-1.5.2.i386.rpm
RedHat Fedora Upgrade mozilla-dom-inspector-1.7.12-1.5.2.i386.rpm
RedHat Fedora Upgrade mozilla-debuginfo-1.7.12-1.5.2.i386.rpm
Mozilla Firefox Preview Release:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 0.8:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 0.9:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 0.9 rc:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 0.9.1:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 0.9.2:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 0.9.3:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 0.10 :
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 0.10.1:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 1.0:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 1.0.1:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 1.0.2:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 1.0.3:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 1.0.4:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 1.0.5:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 1.0.5:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 1.0.6:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 1.0.7:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 1.5:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 1.5 beta 1:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla Firefox 1.5 beta 2:
Mozilla Upgrade Firefox 1.5.0.1
Mozilla SeaMonkey 1.0 dev:
Mozilla Upgrade SeaMonkey 1.0
Sun Solaris 10.0:
Sun Patch 119115-19
Sun Solaris 10.0 _x86:
Sun Patch 119116-19
|
WebAttackMozillaFirefoxThunderbirdSeaMonkeyCVE-2013-1710
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt of leveraging a vulnerability in Mozilla Firefox/Thunderbird/SeaMonkey which may leads to arbitrary code execution.
Additional Information
Firefox is a browser. SeaMonkey is a suite of applications that includes a browser and an email client. Thunderbird is an email client. All three applications are available for multiple platforms.
The applications are prone to a remote code execution vulnerability. Specifically, this issue occurs when generating a Certificate Request Message Format (CRMF) request.
Attackers can exploit this vulnerability to execute arbitrary code in the context of the user running the vulnerable application, execute arbitrary script code in the browser of an unsuspecting user in the context of a targeted site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Affected
Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20.
|
WebAttackMozillaFirefoxThunderbirdSeaMonkeyCVE-2014-1510
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts of leveraging a privilege-escalation vulnerability in Mozilla Firefox, SeaMonkey, and Thunderbird which could result in gaining elevated privileges and perform unauthorized actions.
Additional Information
Firefox is a browser. SeaMonkey is a suite of applications that includes a browser and an email client. Thunderbird is an email client. All three applications are available for multiple platforms.
Mozilla Firefox, SeaMonkey, and Thunderbird are prone to privilege-escalation vulnerability. This issue occurs when loading an untrusted content from chrome privileged page by getting JavaScript implemented WebIDL and calls functions related to browsers.
Remote attackers can exploit this issue to gain elevated privileges and perform unauthorized actions.
Affected
These issues are fixed in:
Firefox 28
Firefox ESR 24.4
Thunderbird 24.4
Seamonkey 2.25
|
WebAttackMozillaFirefoxUTF-8CVE-2008-0016
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a buffer overflow vulnerability in Firefox which may result in remote code execution.
Additional Information
Mozilla Firefox is a web browser available for multiple platforms. SeaMonkey is an all-in-one application suite.
Firefox and SeaMonkey are prone to a stack-based buffer-overflow vulnerability. This issue affects URI parsing. Attackers can exploit this issue with a specially crafted UTF-8 URI in a hyperlink.
Very few technical details are currently unavailable. We will update this BID as soon as more information emerges.
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
NOTE: This issue was originally documented in BID 31346 (Mozilla Firefox/SeaMonkey/Thunderbird Multiple Remote Vulnerabilities). It has been given its own record to better document the details.
Affected
Versions prior to Firefox 2.0.0.17 and prior to SeaMonkey 1.1.12 are vulnerable.
Response
Download and install all vendor patches related to this vulnerability.
|
WebAttackMozillamChannelCVE-2011-0065
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Mozilla Firefox and SeaMonkey are prone to a memory-corruption vulnerability that may allow remote code execution. An attacker can exploit this issue by enticing an unsuspecting user into viewing malicious content. A successful exploit will result in the execution of attacker-supplied code where user may run the affected application. Failed exploit attempts will likely result in denial-of-service conditions. This issue is fixed in: Firefox 3.6.17 Firefox 3.5.19 SeaMonkey 2.0.14 .
Additional Information
Firefox is a browser. SeaMonkey is a suite of applications that includes a browser and an email client. Both applications are available for multiple platforms.
Mozilla Firefox and SeaMonkey are prone to a memory-corruption vulnerability that may allow remote code execution. Specifically, when an Object element has no 'mChannel' object assigned to it and the 'OnChannelRedirect' method is invoked, an attacker can point the method to an arbitrary object as the channel in use. The affected object will then turn into a dangling pointer, which may allow attackers to corrupt memory and execute arbitrary code.
An attacker can exploit this issue by enticing an unsuspecting user into viewing malicious content. A successful exploit will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
This issue is fixed in:
Firefox 3.6.17
Firefox 3.5.19
SeaMonkey 2.0.14
NOTE: This issue was previously discussed in BID 47635 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2011-12 through -18 Multiple Vulnerabilities) but has been moved to its own record to better document it.
Affected
An attacker may be able to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Response
The following exploits are available:
|
WebAttackMSCMSInformationDisclosureVulnerability
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to remotely exploit a vulnerability in Microsoft Content Management Server software which could result in information disclosure.
Additional Information
A cross-site scripting vulnerability exists in Microsoft Content Management Server (MCMS). The vulnerability could allow the injection of a client-side script in the user's browser.
The HTTP response splitting vulnerability (a form of XSS) exists in MCMS's "/NR/System/Access/DefaultGuestLogin.asp" page. The vulnerability arises because MCMS takes data sent to the server by the user and uses some of that data in the response header sent back to the browser without proper validation.
Affected
Microsoft Content Management Server 2001 SP1
Microsoft Content Management Server 2002 SP2
Response
Upgrade to the latest version of Microsoft Content Management Server software and ensure that all patches are applied.
|
WebAttackMSDLLHijackingActivity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit the DLL Hijacking vulnerability in Microsoft Windows OS.
Additional Information
DLL Hijacking attack exploits the way Windows applications search and load Dynamic Link Libraries.
Affected
Various Windows platforms
Response
NA
|
WebAttackMSDLLHijackingActivity2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit the DLL Hijacking vulnerability in Microsoft Windows OS.
Additional Information
DLL Hijacking attack exploits the way Windows applications search and load Dynamic Link Libraries.
Affected
Various Windows platforms
Response
NA
|
Web Attack: MSDT Remote Code Execution CVE-2022-30190
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulneraibility in Microsoft Windows Support Diagnostic Tool.
Additional Information
A vulnerability exists in Microsoft Windows Support Diagnostic Tool (MSDT) that can lead to execution of arbitrary code.
Affected
Various Windows machines.
Response
|
WebAttackMSEDGECVE-2017-0227
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSEDGECVE-2017-0228
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows IE and Edge
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSEDGECVE-2017-0240
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSEdgeCVE-2017-8605
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote memory corruption vulnerability in Microsoft Edge
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the scripting engines fail to properly handle objects in memory. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Edge.
|
WebAttackMSEdgeCVE-2017-8617
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Edge
Additional Information
Microsoft Edge is a web browser available for Microsoft Windows.
Microsoft Edge is prone to a remote code-execution vulnerability because the scripting engines fail to properly handle objects in memory. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. This could allow the attackers to obtain information to further compromise the user system.
Affected
Microsoft Edge.
|
WebAttackMSEDGECVE-2017-8731
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Microsoft Edge is a web browser available for Windows.
Microsoft Edge is prone to a remote memory-corruption vulnerability because it fails to properly access objects in memory.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Windows product
|
WebAttackMSEDGECVE-2018-8275
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This Signature detects attempts of exploiting CVE-2018-8275 Remote Memory Corruption Vulnerability in MS Edge
Additional Information
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
MS Edge
|
WebAttackMSEDGECVE-2018-8279
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt of CVE-2018-8279 exploitation. Remote Memory Corruption Vulnerability.
Additional Information
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Edge
|
WebAttackMSEDGECVE-2018-8296
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to exploit CVE-2018-8296 Remote Memory Corruption Vulnerability
Additional Information
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Internet Explorer
|
WebAttackMSFrontPageRemoteDebug
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a flaw in Microsoft Frontpage Server Extension's Remote Debugging interface through a specially crafted URI.
Additional Information
FrontPage Server Extensions are a component for FrontPage that allows authorized users to edit and maintain content.
FrontPage Server Extensions includes remote debugging functionality, allowing users to connect to the server to debug content using software such as Visual Interdev. A remotely exploitable buffer overflow vulnerability has been reported in the remote debugging functionality provided by the software.
This issue is due to an unchecked buffer size in a .DLL (fp30reg.dll) included with the extensions. It is possible to trigger this issue by sending a malformed chunked-encoded HTTP POST request. This will allow the attacker to influence the values in the ECX and EDI registers, which may be leveraged to execute arbitrary code. Exploitation may allow a remote attacker to execute arbitrary code on a vulnerable system with Local System privileges.
Affected
Microsoft FrontPage Server Extensions 2000
Microsoft FrontPage Server Extensions 2002
Microsoft SharePoint Team Services 2002
Microsoft Windows 2000 Advanced Server SP2, SP3
Microsoft Windows 2000 Datacenter Server SP2, SP3
Microsoft Windows 2000 Professional SP2, SP3
Microsoft Windows 2000 Server SP2, SP3
Microsoft Windows XP 64-bit Edition SP1
Microsoft Windows XP Home SP1
Microsoft Windows XP Professional SP1
Response
Microsoft has released updates to address this issue.
|
WebAttackMSFrontPageRemoteDebugCAN-2003-0822
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a flaw in Microsoft Frontpage Server Extension's Remote Debugging interface through a specially crafted URI.
Additional Information
FrontPage Server Extensions are a component for FrontPage that allows authorized users to edit and maintain content.
FrontPage Server Extensions includes remote debugging functionality, allowing users to connect to the server to debug content using software such as Visual Interdev. A remotely exploitable buffer overflow vulnerability has been reported in the remote debugging functionality provided by the software.
This issue is due to an unchecked buffer size in a .DLL (fp30reg.dll) included with the extensions. It is possible to trigger this issue by sending a malformed chunked-encoded HTTP POST request. This will allow the attacker to influence the values in the ECX and EDI registers, which may be leveraged to execute arbitrary code. Exploitation may allow a remote attacker to execute arbitrary code on a vulnerable system with Local System privileges.
Affected
Microsoft FrontPage Server Extensions 2000
Microsoft FrontPage Server Extensions 2002
Microsoft SharePoint Team Services 2002
Microsoft Windows 2000 Advanced Server SP2, SP3
Microsoft Windows 2000 Datacenter Server SP2, SP3
Microsoft Windows 2000 Professional SP2, SP3
Microsoft Windows 2000 Server SP2, SP3
Microsoft Windows XP 64-bit Edition SP1
Microsoft Windows XP Home SP1
Microsoft Windows XP Professional SP1
Response
Microsoft has released updates to address this issue.
|
WebAttackMSFrontPageSmartHTMLDenialofServiceVulnerability
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects an attempt to conduct a Denial of Service against the SmartHTML Interpreter Frontpage Server Extension.
Additional Information
FrontPage Server Extensions are a component for FrontPage that allows authorized users to edit and maintain content.
FrontPage Server Extensions include the SmartHTML interpreter, which allows web pages to access various FrontPage features. A denial of service vulnerability has been reported in the SmartHTML interpreter that may be exploited by remote attackers. It is possible to send an invalid request that will cause the interpreter to cycle, denying availability of CPU resources. In this manner, it is possible to cause a denial of service by exhausting available resources on the system.
Affected
Microsoft FrontPage Server Extensions 2000
Microsoft FrontPage Server Extensions 2002
Microsoft SharePoint Team Services 2002
Microsoft Windows 2000 Advanced Server SP2, SP3
Microsoft Windows 2000 Datacenter Server SP2, SP3
Microsoft Windows 2000 Professional SP2, SP3
Microsoft Windows 2000 Server SP2, SP3
Microsoft Windows XP 64-bit Edition SP1
Microsoft Windows XP Home SP1
Microsoft Windows XP Professional SP1
Response
Microsoft has released updates to address this issue.
Microsoft FrontPage Server Extensions 2000:
Microsoft Upgrade Security Update for Microsoft FrontPage Server Extensions 2000
http://www.microsoft.com/downloads/details.aspx?FamilyId=C84C3D10-A821-4819-BF58-D3BC70A77BFA&displaylang=en
Microsoft FrontPage Server Extensions 2002:
Microsoft Upgrade FrontPage 2002 Server Extensions Security Patch: KB813380
http://www.microsoft.com/downloads/details.aspx?FamilyId=3E8A21D9-708E-4E69-8299-86C49321EE25&displaylang=en
Microsoft SharePoint Team Services 2002:
Microsoft Upgrade Office XP Web Services Security Patch: KB812708
http://www.microsoft.com/downloads/details.aspx?FamilyId=5923FC2F-D786-4E32-8F15-36A1C9E0A340&displaylang=en
Microsoft Windows 2000 Advanced Server SP2:
Microsoft Upgrade Security Update for Windows 2000: KB810217
http://www.microsoft.com/downloads/details.aspx?FamilyId=057D5F0E-0E2B-47D2-9F0F-3B15DD8622A2&displaylang=en
Microsoft Windows 2000 Advanced Server SP3:
Microsoft Upgrade Security Update for Windows 2000: KB810217
http://www.microsoft.com/downloads/details.aspx?FamilyId=057D5F0E-0E2B-47D2-9F0F-3B15DD8622A2&displaylang=en
Microsoft Windows 2000 Professional SP2:
Microsoft Upgrade Security Update for Windows 2000: KB810217
http://www.microsoft.com/downloads/details.aspx?FamilyId=057D5F0E-0E2B-47D2-9F0F-3B15DD8622A2&displaylang=en
Microsoft Windows 2000 Professional SP3:
Microsoft Upgrade Security Update for Windows 2000: KB810217
http://www.microsoft.com/downloads/details.aspx?FamilyId=057D5F0E-0E2B-47D2-9F0F-3B15DD8622A2&displaylang=en
Microsoft Windows 2000 Server SP2:
Microsoft Upgrade Security Update for Windows 2000: KB810217
http://www.microsoft.com/downloads/details.aspx?FamilyId=057D5F0E-0E2B-47D2-9F0F-3B15DD8622A2&displaylang=en
Microsoft Windows 2000 Server SP3:
Microsoft Upgrade Security Update for Windows 2000: KB810217
http://www.microsoft.com/downloads/details.aspx?FamilyId=057D5F0E-0E2B-47D2-9F0F-3B15DD8622A2&displaylang=en
Microsoft Windows XP Home SP1:
Microsoft Upgrade Security Update for Windows XP: KB810217
http://www.microsoft.com/downloads/details.aspx?FamilyId=9B302532-BFAB-489B-82DC-ED1E49A16E1C&displaylang=en
Microsoft Windows XP Professional SP1:
Microsoft Upgrade Security Update for Windows XP: KB810217
http://www.microsoft.com/downloads/details.aspx?FamilyId=9B302532-BFAB-489B-82DC-ED1E49A16E1C&displaylang=en
|
Web Attack: MSH.Bluwimps Download 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files.
Additional Information
MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files.
Affected
Windows OS
Response
|
WebAttackMSH.BluwimpsDownload4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files.
Additional Information
MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files.
Affected
Windows OS
Response
|
WebAttackMSH.BluwimpsDownload5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files.
Additional Information
MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files.
Affected
Windows OS
Response
|
WebAttackMSH.BluwimpsDownload6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files.
Additional Information
MSH.Bluwimps is a PowerShell script that steals information from the compromised computer. It may also download potentially malicious files.
Affected
Windows OS
Response
|
WebAttackMSIE&EdgeCVE-2017-8750
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote memory corruption vulnerability in Microsoft Internet Explorer and Edge.
Additional Information
Microsoft Internet Explorer and Edge are prone to a remote memory-corruption vulnerability because it fails to properly handle objects in memory.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Internet Explorer 11
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 Version 1607 for 32-bit Systems 0
+ Microsoft Windows 10 Version 1607 for x64-based Systems 0
+ Microsoft Windows 10 version 1703 for 32-bit Systems 0
+ Microsoft Windows 10 version 1703 for x64-based Systems 0
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 8.1 for 32-bit Systems 0
+ Microsoft Windows 8.1 for 32-bit Systems 0
+ Microsoft Windows 8.1 for 32-bit Systems 0
+ Microsoft Windows 8.1 for x64-based Systems 0
+ Microsoft Windows 8.1 for x64-based Systems 0
+ Microsoft Windows 8.1 for x64-based Systems 0
+ Microsoft Windows Rt 8.1 -
+ Microsoft Windows Rt 8.1 -
+ Microsoft Windows Rt 8.1 -
+ Microsoft Windows Server 2016
+ Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2
+ Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2012 R2 0
+ Microsoft Windows Server 2012 R2 0
+ Microsoft Windows Server 2012 R2 0
Microsoft Edge 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 Version 1607 for 32-bit Systems 0
+ Microsoft Windows 10 Version 1607 for x64-based Systems 0
+ Microsoft Windows Server 2016 for x64-based Systems 0
|
WebAttackMSIE7UninitializedMemoryCodeExec
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a uninitialized memory corruption vulnerability in Internet Explorer which may result in remote code execution.
Additional Information
A remote code execution vulnerability exists in the way Internet Explorer accesses an object that has been deleted. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.
To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2009-0075.
Affected
Internet Explorer 7
Response
Download and install all vendor patches related to this vulnerability.
|
WebAttackMSIEAdobeReaderTIFFFileCVE-2010-0188
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to exploit a remote code execution vulnerability in Adobe Acrobat.
Additional Information
Adobe Reader and Acrobat are applications for handling PDF files.
Adobe Acrobat and Reader are prone to an unspecified remote code-execution vulnerability.
Technical details are currently unavailable. We will update this BID as soon as more information emerges.
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
The following products are affected:
Reader 9.3 for Windows, Macintosh, and UNIX
Acrobat 9.3 for Windows and Macintosh
Reader 8.2 for Windows and Macintosh
Acrobat 8.2 for Windows and Macintosh
NOTE: This BID was originally titled 'Adobe Acrobat and Reader APSB10-07 Unspecified Security Vulnerabilities' but has been updated with the release of the Adobe patches.
NOTE (February 19, 2010): Reports indicate that this issue may be related to the vulnerability discussed in BID 19283 (LibTIFF TiffFetchShortPair Remote Buffer Overflow Vulnerability). We will update this BID as more information emerges.
Affected
Adobe Acrobat
Response
Updates are available. Please see the references for details.
|
WebAttackMSIEClonedDOMObjectCVE-2010-0248
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a browser for the Windows operating system.
Internet Explorer is prone to a remote code-execution vulnerability that arises when the browser displays a malicious webpage. This issue occurs because of an error when accessing an object that has been incorrectly initialized or deleted. Specifically, this error is related to the handling of cloned DOM (Document Object Model) objects in JavaScript.
An attacker can exploit this issue by enticing an unsuspecting user into viewing a malicious webpage.
Successful exploits will allow the attacker to execute arbitrary code in the context of the user running the application, which can compromise the application and possibly the computer. Failed attacks may cause denial-of-service conditions.
Affected
Microsoft Internet Explorer
|
WebAttackMSIECloneNodeUse-After-FreeCVE-2012-2557
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue occurs because the application accesses an object in memory that has not been correctly initialized or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 7 and 8 are affected.
Affected
Microsoft Internet Explorer versions 7 and 8.
|
WebAttackMSIECommonControlsActiveXCVE-2012-0158
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Windows Common Controls.
Additional Information
Microsoft Windows Common Control Library is used by Windows Explorer to create controls such as list view, header, tree tip, tooltip, tool bar, status bar, etc.
The application is prone to a remote code-execution vulnerability. Specifically, this issue affects 'MSCOMCTL.TreeView', 'MSCOMCTL.ListView2', 'MSCOMCTL.TreeView2', and 'MSCOMCTL.ListView' ActiveX controls contained in the 'MSCOMCTL.OCX' file. The controls are identified by the following CLSIDs:
bdd1f04b-858b-11d1-b16a-00c0f0283628
996BF5E0-8044-4650-ADEB-0B013914E99C
C74190B6-8589-11d1-B16A-00C0F0283628
9181DC5F-E07D-418A-ACA6-8EEA1ECB8E9E
An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage.
Successful exploits will allow the attacker to execute arbitrary code within the context of the application (typically Internet Explorer) that uses the ActiveX control.
Affected
Microsoft Visual FoxPro 9.0 SP2
Microsoft Visual FoxPro 9.0 SP1
Microsoft Visual FoxPro 8.0 SP1
Microsoft Visual FoxPro 8.0
Microsoft Visual Basic 6.0
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
Microsoft SQL Server 2008 x64 SP3
Microsoft SQL Server 2008 x64 SP2
Microsoft SQL Server 2008 itanium SP3
Microsoft SQL Server 2008 itanium SP2
Microsoft SQL Server 2008 itanium SP1
Microsoft SQL Server 2008 itanium R2
Microsoft SQL Server 2008 32-bit SP3
Microsoft SQL Server 2008 32-bit SP2
Microsoft SQL Server 2008 32-bit R2
Microsoft SQL Server 2008 R2 SP1
Microsoft SQL Server 2008 R2
Microsoft SQL Server 2008 0
Microsoft SQL Server 2005 x64 Edition SP4
Microsoft SQL Server 2005 x64 Edition SP3
Microsoft SQL Server 2005 x64 Edition SP2
Microsoft SQL Server 2005 x64 Edition SP1
Microsoft SQL Server 2005 Itanium Edition SP4
Microsoft SQL Server 2005 Itanium Edition SP3
Microsoft SQL Server 2005 Itanium Edition SP2
Microsoft SQL Server 2005 Itanium Edition SP1
Microsoft SQL Server 2005 Itanium Edition 0
Microsoft SQL Server 2005 Express Edition SP4
Microsoft SQL Server 2005 Express Edition SP3
Microsoft SQL Server 2005 Express Edition SP2
Microsoft SQL Server 2005 Express Edition SP1
Microsoft SQL Server 2000 SP4
Microsoft SQL Server 2000 SP3
Microsoft SQL Server 2000 SP2
Microsoft SQL Server 2000 SP1
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
Microsoft SQL Server 2000
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0
Microsoft Office 2010 (32-bit edition) 0
Microsoft Office 2010 0
Microsoft Office 2010 (32-bit edition) SP1
Microsoft Office 2007 SP2
Microsoft Office 2007 SP1
Microsoft Office 2003 Web Components SP3
Microsoft Office 2003 SP3
Microsoft Office 2003 SP2
Microsoft Office 2003 SP1
Microsoft Commerce Server 2009 R2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2009 0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 SP2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2007 0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Server SP2
Microsoft Commerce Server 2002 SP4
Microsoft Commerce Server 2002 SP3
Microsoft Commerce Server 2002 SP2
Microsoft Commerce Server 2002 SP1
Microsoft BizTalk Server 2002 SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
|
WebAttackMSIECSSTagCVE-2010-3962
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a suspicious web page which may result in compromise of the host machine resulting in remote code execution.
Additional Information
This signature detects a suspicious web page which may result in compromise of the host machine resulting in remote code execution.
Affected
Microsoft Internet Explorer 6.0, 7.0
Response
Download and install all vendor patches for this vulnerability.
|
WebAttackMSIECVE-2010-0249
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Internet Explorer is a browser for the Microsoft Windows operating system.
Internet Explorer is prone to a remote code-execution vulnerability. The issue is caused by a memory-corruption error triggered by an invalid pointer to a deleted object. Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the browser. Successful exploits will compromise the application and possibly the computer. Failed attacks will cause denial-of-service conditions.
Affected
Microsoft Internet Explorer
Response
Download and install all vendor patches related to this vulnerability.
|
WebAttackMSIECVE-2010-3962
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a suspicious web page which may result in compromise of the host machine resulting in remote code execution.
Additional Information
Microsoft Internet Explorer is a web browser available for Microsoft Windows platforms.
Internet Explorer is prone to a remote code-execution vulnerability. This issue occurs when storing a certain combination of Cascading Style Sheet (CSS) tags and can result in a user-after-free condition.
An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage.
Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions.
Affected
Microsoft Internet Explorer 6.0, 7.0
Response
Download and install all vendor patches related to this vulnerability
|
WebAttackMSIECVE-2011-1260
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Internet Explorer.
Additional Information
Microsoft Internet Explorer is a web browser available for Microsoft Windows platforms.
Microsoft Internet Explorer is prone to a remote code-execution vulnerability because of a use-after-free error. This issue occurs when the application attempts to access an object that is not properly initialized or has been deleted. Specifically, this issue affects the 'layout-grid-char' style property.
An attacker can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Successful exploits will allow an attacker to run arbitrary code in the context of the user running the affected application. Failed attacks will cause denial-of-service conditions.
Affected
Various Windows platforms
Response
NA
|
WebAttackMSIECVE-2012-1526
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer
Additional Information
A remote code execution vulnerability exists in Microsoft Internet Explorer that can be exploited to run arbitrary code.
Affected
Microsoft Internet Explorer
|
WebAttackMSIECVE-2012-1879
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer
Additional Information
A memory corruption vulnerability in Microsoft Internet Explorer may lead to remote code execution
Affected
Internet Explorer
|
WebAttackMSIECVE-2012-18792
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer
Additional Information
A memory corruption vulnerability in Microsoft Internet Explorer may lead to remote code execution
Affected
Internet Explorer
|
WebAttackMSIECVE-2012-2521
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer
Additional Information
A remote code execution vulnerability exists in Microsoft Internet Explorer that can be exploited to run arbitrary code.
Affected
Microsoft Internet Explorer
|
WebAttackMSIECVE-2012-2522
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
A vulnerability exists in Microsoft Internet Explorer when handling certain DOM operations. This may lead to crash or remote code execution.
Affected
Microsoft Internet Explorer
|
WebAttackMSIECVE-2012-4792
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
|
WebAttackMSIECVE-2012-47922
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
|
Web Attack: MSIE CVE-2013-2551
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a vulnerability in Microsoft Internet Explorer which may result in remote code execution.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer 6, 7, 8 ,9, and 10
|
Web Attack: MSIE CVE-2013-2551 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a vulnerability in Microsoft Internet Explorer which may result in remote code execution.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer 6, 7, 8 ,9, and 10
|
Web Attack: MSIE CVE-2013-2551 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a vulnerability in Microsoft Internet Explorer which may result in remote code execution.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer 6, 7, 8 ,9, and 10
|
WebAttackMSIECVE-2013-25514
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a vulnerability in Microsoft Internet Explorer which may result in remote code execution.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer 6, 7, 8 ,9, and 10
|
Web Attack: MSIE CVE-2013-2551 6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a vulnerability in Microsoft Internet Explorer which may result in remote code execution.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer 6, 7, 8 ,9, and 10
|
WebAttackMSIECVE-2014-0274
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-0275
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-0278
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-0281
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-0289
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-0290
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-1805
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-2820
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-2824
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-4063
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-4088
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-4089
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-4092
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-4094
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-4127
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-4130
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-4136
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-4141
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-4144
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-6330
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-6339
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-6348
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-6369
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-6370
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2014-8967
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a web browser available for multiple platforms.
Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Specifically, this issue occurs because, when applying CSS style of 'display:run-in' to a page can cause an object's reference count to fall to zero prematurely, causing the object to be freed.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.
Affected
Microsoft Internet Explorer
|
WebAttackMSIECVE-2015-0019
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-0039
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-0041
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-0044
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-0046
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-0048
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-0049
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-00532
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-0069
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-0072
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to bypass Same Origin Policy in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is prone to a Same Origin Policy(SOP) bypass vulnerability. Attackers can steal anything from another domain, and inject anything into another domain.
Affected
Microsoft Internet Explorer.
|
WebAttackMSIECVE-2015-00722
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to bypass Same Origin Policy in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is prone to a Same Origin Policy(SOP) bypass vulnerability. Attackers can steal anything from another domain, and inject anything into another domain.
Affected
Microsoft Internet Explorer.
|
WebAttackMSIECVE-2015-0081
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1685
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1687
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1689
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1691
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1706
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1708
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1709
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote memory corruption vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the application fails to properly access objects in memory.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Internet Explorer 8, 9, 10 and 11 are vulnerable.
Affected
Internet Explorer 8, 9, 10 and 11.
|
WebAttackMSIECVE-2015-1710
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.