text
stringlengths 0
383k
|
---|
WebAttackMSIECVE-2015-1718
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1730
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1732
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1733
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1736
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1741
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1742
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1748
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-1752
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
Web Attack: MSIE CVE-2015-2419
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Additional Information
Microsoft Internet Explorer is a browser for the Windows operating system.
Internet Explorer is prone to a remote code-execution vulnerability. Specifically, this issue occurs because the JScript engine fails to properly access an object in memory.
Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks may cause denial-of-service conditions.
Affected
Multiple versions of Internet Explorer
|
WebAttackMSIECVE-2015-24192
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Additional Information
Microsoft Internet Explorer is a browser for the Windows operating system.
Internet Explorer is prone to a remote code-execution vulnerability. Specifically, this issue occurs because the JScript engine fails to properly access an object in memory.
Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks may cause denial-of-service conditions.
Affected
Multiple versions of Internet Explorer
|
WebAttackMSIECVE-2015-24193
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Additional Information
Microsoft Internet Explorer is a browser for the Windows operating system.
Internet Explorer is prone to a remote code-execution vulnerability. Specifically, this issue occurs because the JScript engine fails to properly access an object in memory.
Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks may cause denial-of-service conditions.
Affected
Multiple versions of Internet Explorer
|
WebAttackMSIECVE-2015-6048
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Signature detects attempt to exploit Memory Corruption vulnerability of MS Internet Explorer.
Additional Information
Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability", a different vulnerability than CVE-2015-6049.
Affected
Microsoft Internet Explorer 7 through 11
|
WebAttackMSIECVE-2015-6078
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-6085
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-6140
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-6141
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2015-6163
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer and Edge are prone to a remote memory-corruption vulnerability. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. The following products are vulnerable: Internet Explorer 8, 9, 10 and 11 Edge
Affected
Internet Explorer 8, 9, 10 and 11 Edge
|
WebAttackMSIECVE-2016-0001
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2016-3205
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2017-0037
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2017-0208
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIECVE-2017-8496
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Edge.
|
WebAttackMSIECVE-2017-8497
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Additional Information
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions.
Affected
Microsoft Edge.
|
WebAttackMSIECVE-2017-8529
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Microsoft Internet Explorer and Edge are prone to an information disclosure vulnerability because they fail to properly handle objects in the memory. An attacker can exploit this issue to detect specific files on the system.
Additional Information
Microsoft Internet Explorer and Edge are prone to an information disclosure vulnerability because they fail to properly handle objects in the memory. An attacker can exploit this issue to detect specific files on the system.
Affected
Internet Explorer 9, 10, 11 and Edge are vulnerable.
|
WebAttackMSIECVE-2018-8242
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to exploit CVE-2018-8242. Remote Memory Corruption Vulnerability.
Additional Information
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions
Affected
Internet Explorer 9, 10 and 11 are vulnerable
|
WebAttackMSIECVE-2018-8373
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote memory corruption vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the browser fails to properly handle objects in memory. This may allow attackers to embed an ActiveX control marked 'safe for initialization' in an application or Microsoft Office document that hosts the browser rendering engine.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the affected application.
Affected
Microsoft Internet Explorer 9
+ Microsoft Windows 7
+ Microsoft Windows 7
+ Microsoft Windows 7
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems 0
+ Microsoft Windows 7 for 32-bit Systems 0
+ Microsoft Windows 7 for 32-bit Systems 0
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems 0
+ Microsoft Windows 7 for x64-based Systems 0
+ Microsoft Windows 7 for x64-based Systems 0
+ Microsoft Windows 7 Home Premium - Sp1 X64
+ Microsoft Windows 7 Home Premium - Sp1 X64
+ Microsoft Windows 7 Home Premium - Sp1 X64
+ Microsoft Windows 7 Home Premium - Sp1 X32
+ Microsoft Windows 7 Home Premium - Sp1 X32
+ Microsoft Windows 7 Home Premium - Sp1 X32
+ Microsoft Windows Server 2008 R2
+ Microsoft Windows Server 2008 R2
+ Microsoft Windows Server 2008 R2
+ Microsoft Windows Server 2008 for 32-bit Systems SP2
+ Microsoft Windows Server 2008 for 32-bit Systems SP2
+ Microsoft Windows Server 2008 for 32-bit Systems SP2
+ Microsoft Windows Server 2008 for 32-bit Systems 0
+ Microsoft Windows Server 2008 for 32-bit Systems 0
+ Microsoft Windows Server 2008 for 32-bit Systems 0
+ Microsoft Windows Server 2008 for x64-based Systems SP2
+ Microsoft Windows Server 2008 for x64-based Systems SP2
+ Microsoft Windows Server 2008 for x64-based Systems SP2
+ Microsoft Windows Server 2008 for x64-based Systems 0
+ Microsoft Windows Server 2008 for x64-based Systems 0
+ Microsoft Windows Server 2008 for x64-based Systems 0
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Vista SP2
+ Microsoft Windows Vista SP2
+ Microsoft Windows Vista SP2
+ Microsoft Windows Vista SP1
+ Microsoft Windows Vista SP1
+ Microsoft Windows Vista SP1
+ Microsoft Windows Vista x64 Edition SP2
+ Microsoft Windows Vista x64 Edition SP2
+ Microsoft Windows Vista x64 Edition SP2
+ Microsoft Windows Vista x64 Edition SP1
+ Microsoft Windows Vista x64 Edition SP1
+ Microsoft Windows Vista x64 Edition SP1
+ Microsoft Windows Vista x64 Edition 0
+ Microsoft Windows Vista x64 Edition 0
+ Microsoft Windows Vista x64 Edition 0
Microsoft Internet Explorer 11
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 Version 1607 for 32-bit Systems 0
+ Microsoft Windows 10 Version 1607 for 32-bit Systems 0
+ Microsoft Windows 10 Version 1607 for 32-bit Systems 0
+ Microsoft Windows 10 Version 1607 for x64-based Systems 0
+ Microsoft Windows 10 Version 1607 for x64-based Systems 0
+ Microsoft Windows 10 Version 1607 for x64-based Systems 0
+ Microsoft Windows 10 version 1703 for 32-bit Systems 0
+ Microsoft Windows 10 version 1703 for 32-bit Systems 0
+ Microsoft Windows 10 version 1703 for 32-bit Systems 0
+ Microsoft Windows 10 version 1703 for x64-based Systems 0
+ Microsoft Windows 10 version 1703 for x64-based Systems 0
+ Microsoft Windows 10 version 1703 for x64-based Systems 0
+ Microsoft Windows 10 version 1709 for 32-bit Systems 0
+ Microsoft Windows 10 version 1709 for 32-bit Systems 0
+ Microsoft Windows 10 version 1709 for x64-based Systems 0
+ Microsoft Windows 10 version 1709 for x64-based Systems 0
+ Microsoft Windows 10 Version 1803 for 32-bit Systems 0
+ Microsoft Windows 10 Version 1803 for x64-based Systems 0
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 8.1 for 32-bit Systems 0
+ Microsoft Windows 8.1 for 32-bit Systems 0
+ Microsoft Windows 8.1 for 32-bit Systems 0
+ Microsoft Windows 8.1 for 32-bit Systems 0
+ Microsoft Windows 8.1 for 32-bit Systems 0
+ Microsoft Windows 8.1 for x64-based Systems 0
+ Microsoft Windows 8.1 for x64-based Systems 0
+ Microsoft Windows 8.1 for x64-based Systems 0
+ Microsoft Windows 8.1 for x64-based Systems 0
+ Microsoft Windows 8.1 for x64-based Systems 0
+ Microsoft Windows Rt 8.1 -
+ Microsoft Windows Rt 8.1 -
+ Microsoft Windows Rt 8.1 -
+ Microsoft Windows Rt 8.1 -
+ Microsoft Windows Rt 8.1 -
+ Microsoft Windows Server 2016
+ Microsoft Windows Server 2016
+ Microsoft Windows Server 2016
+ Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2
+ Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2
+ Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2
+ Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2012 R2 0
+ Microsoft Windows Server 2012 R2 0
+ Microsoft Windows Server 2012 R2 0
+ Microsoft Windows Server 2012 R2 0
+ Microsoft Windows Server 2012 R2 0
Microsoft Internet Explorer 10
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 8 for 32-bit Systems 0
+ Microsoft Windows 8 for 32-bit Systems 0
+ Microsoft Windows 8 for x64-based Systems 0
+ Microsoft Windows 8 for x64-based Systems 0
+ Microsoft Windows RT 0
+ Microsoft Windows RT 0
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2012 0
+ Microsoft Windows Server 2012 0
+ Microsoft Windows Server 2012 0
|
WebAttackMSIEDblBackslashCHMFileExecCVE-2004-0475
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a vulnerability in Microsoft Internet Explorer which allows the execution of .CHM files from untrusted zones.
Additional Information
A vulnerability has been reported in Microsoft Internet Explorer that may permit unauthorized execution of locally stored compiled help files (.CHM).
This issue reportedly permits a web page within the Internet Security Zone to execute .CHM files that are stored on the local system. Due to restrictions implemented in previous security updates, this type of access should only be permitted from the Local Zone.
This vulnerability has been demonstrated using the showHelp() method to reference a local .CHM file, in a manner similar to the vulnerability described in BID 9320. It is possible that there are other means of demonstrating this behavior. It should also be noted that this issue could also be used to cause HTML pages embedded in .CHM files to be interpreted in the Local Zone.
This issue could be exploited with other existing vulnerabilities, such as BID 9658 to execute arbitrary code on the system. Exploitation would require the attacker to place a malicious .CHM file on the system through exploitation of other issues and then execute it through exploitation of this issue.
Note: This BID was created because further research has determined it to be a distinct issue from the vulnerability described in 10344. The primary difference is that BID 10344 allows execution of files from the Local Zone only, while this issue permits a remote web page to directly reference a .CHM file stored on a client system from the Internet Zone. BID 10344 describes an issue that permits unauthorized access to local resources via CODEBASE.
Affected
Microsoft Internet Explorer 6.0 SP1
Response
Upgrade to the latest version of Microsoft Internet Explorer and apply all available patches.
|
WebAttackMSIEEdgeCVE-2018-0891
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit information disclosure vulnerability in Microsoft IE and Edge.
Additional Information
Microsoft Internet Explorer and Edge are web browsers available for Windows.
Microsoft Internet Explorer and Edge are prone to an information disclosure vulnerability. Specifically, this issue occurs because the applications fail to properly handle objects in memory.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page.
Successful exploits will allow attackers to obtain sensitive information that may aid in further attacks.
Affected
Microsoft Internet Explorer 11
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 Version 1607 for 32-bit Systems 0
+ Microsoft Windows 10 Version 1607 for 32-bit Systems 0
+ Microsoft Windows 10 Version 1607 for x64-based Systems 0
+ Microsoft Windows 10 Version 1607 for x64-based Systems 0
+ Microsoft Windows 10 version 1703 for 32-bit Systems 0
+ Microsoft Windows 10 version 1703 for 32-bit Systems 0
+ Microsoft Windows 10 version 1703 for x64-based Systems 0
+ Microsoft Windows 10 version 1703 for x64-based Systems 0
+ Microsoft Windows 10 version 1709 for 32-bit Systems 0
+ Microsoft Windows 10 version 1709 for x64-based Systems 0
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for 32-bit Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 7 for x64-based Systems SP1
+ Microsoft Windows 8.1 for 32-bit Systems 0
+ Microsoft Windows 8.1 for 32-bit Systems 0
+ Microsoft Windows 8.1 for 32-bit Systems 0
+ Microsoft Windows 8.1 for 32-bit Systems 0
+ Microsoft Windows 8.1 for x64-based Systems 0
+ Microsoft Windows 8.1 for x64-based Systems 0
+ Microsoft Windows 8.1 for x64-based Systems 0
+ Microsoft Windows 8.1 for x64-based Systems 0
+ Microsoft Windows Rt 8.1 -
+ Microsoft Windows Rt 8.1 -
+ Microsoft Windows Rt 8.1 -
+ Microsoft Windows Rt 8.1 -
+ Microsoft Windows Server 2016
+ Microsoft Windows Server 2016
+ Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2
+ Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2
+ Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2008 R2 for x64-based Systems SP1
+ Microsoft Windows Server 2012 R2 0
+ Microsoft Windows Server 2012 R2 0
+ Microsoft Windows Server 2012 R2 0
+ Microsoft Windows Server 2012 R2 0
Microsoft Edge 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for 32-bit Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for 32-bit Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 version 1511 for x64-based Systems 0
+ Microsoft Windows 10 Version 1607 for 32-bit Systems 0
+ Microsoft Windows 10 Version 1607 for 32-bit Systems 0
+ Microsoft Windows 10 Version 1607 for 32-bit Systems 0
+ Microsoft Windows 10 Version 1607 for x64-based Systems 0
+ Microsoft Windows 10 Version 1607 for x64-based Systems 0
+ Microsoft Windows 10 Version 1607 for x64-based Systems 0
+ Microsoft Windows 10 version 1703 for 32-bit Systems 0
+ Microsoft Windows 10 version 1703 for 32-bit Systems 0
+ Microsoft Windows 10 version 1703 for x64-based Systems 0
+ Microsoft Windows 10 version 1703 for x64-based Systems 0
+ Microsoft Windows 10 version 1709 for 32-bit Systems 0
+ Microsoft Windows 10 version 1709 for 32-bit Systems 0
+ Microsoft Windows 10 version 1709 for x64-based Systems 0
+ Microsoft Windows 10 version 1709 for x64-based Systems 0
+ Microsoft Windows Server 2016 0
+ Microsoft Windows Server 2016 for x64-based Systems 0
+ Microsoft Windows Server 2016 for x64-based Systems 0
+ Microsoft Windows Server 2016 for x64-based Systems 0
Microsoft ChakraCore 0
|
WebAttackMSIEEventUser-After-FreeCVE-2012-2546
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue occurs because the application accesses an object in memory that has not been correctly initialized or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer 9 is affected.
Affected
Microsoft Internet Explorer 9
|
WebAttackMSIEEXEinIMGCodeExecution
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the use of the Shell:startup function that is being hosted by a compromised web server.
Additional Information
Microsoft Internet Explorer is reported prone to a vulnerability that may allow unauthorized installation of malicious executables. Proof-of-concepts have been released to demonstrate a vulnerability that may be exploited to entice a victim user to install a file on a victim's computer with some degree of user interaction.
Specifically, an executable may be embedded in a Web page and presented as an image object to the user. Another frame can be loaded that references a folder on the victim's file system via the anchorClick style behavior. The page will be obfuscated in such a way as to disguise the fact that when the user clicks on the image object it will implicitly drag it to the folder that has been specified.
It has been demonstrated that various other measures may be taken to limit the amount of user interaction required but the exploit hinges on the user interacting via mouse events with an object within the Web page that represents an executable to cause the executable to be moved to the folder that has been loaded in the obfuscated secondary frame.
An attacker may exploit this vulnerability to influence a target victim into unknowingly installing software in a location on the computer such as the startup foler. If the malicious executable is placed in the startup folder, it will run when the system is restarted.
Affected
Avaya DefinityOne Media Servers
Avaya IP600 Media Servers
Avaya Modular Messaging (MSS) 1.1, 2.0
Avaya S3400 Message Application Server
Avaya S8100 Media Servers
Microsoft Internet Explorer 5.0.1, 5.0.1 SP1, 5.0.1 SP2, 5.0.1 SP3, 5.0.1 SP4, 5.5, 5.5 SP1, 5.5 SP2, 6.0, 6.0 SP1, 6.0 SP2
Microsoft Windows 2000 Advanced Server SP1, SP2, SP3, SP4
Microsoft Windows 2000 Datacenter Server SP1, SP2, SP3, SP4
Microsoft Windows 2000 Professional SP1, SP2, SP3, SP4
Microsoft Windows 2000 Server SP1, SP2, SP3, SP4
Microsoft Windows 98
Microsoft Windows 98SE
Microsoft Windows ME
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Datacenter Edition Itanium
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Enterprise Edition Itanium
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows XP 64-bit Edition SP1
Microsoft Windows XP 64-bit Edition Version 2003
Microsoft Windows XP Home SP1, SP2
Microsoft Windows XP Media Center Edition SP1, SP2
Microsoft Windows XP Professional SP1, SP2
Microsoft Windows XP Tablet PC Edition SP1, SP2
Nortel Networks IP softphone 2050
Nortel Networks Mobile Voice Client 2050
Nortel Networks Optivity Telephony Manager (OTM)
Nortel Networks Symposium Web Center Portal (SWCP)
Nortel Networks Symposium Web Client
Response
Microsoft has released a cumulative update for supported versions of Internet Explorer to address this and other vulnerabilities.
Additional Mitigation
Do not accept communications that originate from unknown or untrusted sources.
Attacks may occur through email. Users should avoid accepting or opening email that appears suspicious or originates from an unfamiliar source. As an additional security measure, client support for HTML email should be disabled.
|
WebAttackMSIEFragusJavaClass
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a CrimePack toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
CrimePack is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various
|
WebAttackMSIEGenericBrowserExploit10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIEGenericBrowserExploit11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIEGenericBrowserExploit12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIEGenericBrowserExploit2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIEGenericBrowserExploit3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIEGenericBrowserExploit4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIEGenericBrowserExploit5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIEGenericBrowserExploit6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIEGenericBrowserExploit8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIEGenericBrowserExploit9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIEImageArraysUse-After-FreeCVE-2012-4969
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue is related to the manipulation of image arrays and affects the 'CMshtmlEd::Exec()' function.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
|
WebAttackMSIEImageArraysUse-After-FreeCVE-2012-49692
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue is related to the manipulation of image arrays and affects the 'CMshtmlEd::Exec()' function.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
|
WebAttackMSIEImageArraysUse-After-FreeCVE-2012-49693
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue is related to the manipulation of image arrays and affects the 'CMshtmlEd::Exec()' function.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
|
WebAttackMSIEImageArraysUse-After-FreeCVE-2012-49694
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue is related to the manipulation of image arrays and affects the 'CMshtmlEd::Exec()' function.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
|
WebAttackMSIEImageArraysUse-After-FreeCVE-2012-49696
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue is related to the manipulation of image arrays and affects the 'CMshtmlEd::Exec()' function.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
|
WebAttackMSIEInstallEngineCtl.HeapBO
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to overflow a buffer in the SetCifFile ActiveX function call by sending an oversized parameter.
Additional Information
A remotely exploitable buffer overflow vulnerability exists in the Microsoft Internet Explorer Install Engine ActiveX control. This vulnerability is caused by insufficient bounds checking of arguments passed to the control.
The vulnerability may be exploited to execute arbitrary code in the context of the client user.
A remotely exploitable buffer overflow vulnerability exists in the Microsoft Internet Explorer Install Engine ActiveX control. The Install Engine is part of the Active Setup Technology included in Internet Explorer, which allows an installation program to retrieve additional files from the Internet that are required for initialization.
This vulnerability is caused by insufficient bounds checking of arguments passed to the control. Specifically, the length of the arguments is not validated before being copied into an internal buffer. This control is marked Safe For Scripting, meaning that an arbitrary Web site may invoke the control and access its methods. The vulnerability may be triggered by passing malformed arguments to affected methods.
Affected
Avaya DefinityOne Media Servers
Avaya IP600 Media Servers
Avaya Modular Messaging (MSS) 1.1, 2.0
Avaya S3400 Message Application Server
Avaya S8100 Media Servers
Microsoft Internet Explorer 5.0.1, 5.0.1 SP1, 5.0.1 SP2, 5.0.1 SP3, 5.0.1 SP4, 5.5, 5.5 SP1, 5.5 SP2, 6.0, 6.0 SP1
Response
Workarounds
This issue can be eliminated by disabling the vulnerable ActiveX control.
Solutions
Microsoft has released a cumulative update for supported versions of Internet Explorer to address this and other vulnerabilities.
Deny by default, do not follow links:
Web users should be wary of visiting sites of questionable integrity or following links provided by unfamiliar or untrusted sources.
Use of least privilege, run client software with the least privileges:
Perform all non-administrative activities as an unprivileged user with minimal access rights. This will limit the impact of client-side vulnerabilities.
Default config, set Web browser security:
Disable support for client-side scripting and Active Content in the Web browser Internet Zone. This may limit exposure to this and other client-side vulnerabilities.
|
WebAttackMSIELayoutMemoryCorruption
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to exploit a memory corruption vulnerability in Internet Explorer.
Additional Information
A memory corruption vulnerability in IE when handling layouts may lead to remote code execution.
Affected
various
|
WebAttackMSIELayoutUse-After-FreeCVE-2012-2548
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue occurs because the application accesses an object in memory that has not been correctly initialized or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer 9 is affected.
Affected
Microsoft Internet Explorer 9
|
WebAttackMSIEMemoryCorruptionCVE-2013-3893
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a memory corruption vulnerability in Microsoft Internet Explorer which could result in remote code execution.
Additional Information
Microsoft Internet Explorer is a web browser available for multiple platforms.
Microsoft Internet Explorer is prone to a memory-corruption vulnerability. The issue occurs because the application accesses an object in memory that has been deleted or has not been properly allocated.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer versions 6, 7, 8, 9, 10, and 11 are affected.
Response
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
|
WebAttackMSIEMemoryCorruptionCVE-2013-38932
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a memory corruption vulnerability in Microsoft Internet Explorer which could result in remote code execution.
Additional Information
Microsoft Internet Explorer is a web browser available for multiple platforms.
Microsoft Internet Explorer is prone to a memory-corruption vulnerability. The issue occurs because the application accesses an object in memory that has been deleted or has not been properly allocated.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer versions 6, 7, 8, 9, 10, and 11 are affected.
Response
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
|
Web Attack: MSIE Memory Corruption CVE-2013-3893 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a memory corruption vulnerability in Microsoft Internet Explorer which could result in remote code execution.
Additional Information
Microsoft Internet Explorer is a web browser available for multiple platforms.
Microsoft Internet Explorer is prone to a memory-corruption vulnerability. The issue occurs because the application accesses an object in memory that has been deleted or has not been properly allocated.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer versions 6, 7, 8, 9, 10, and 11 are affected.
Response
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
|
Web Attack: MSIE Memory Corruption CVE-2013-3893 4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a memory corruption vulnerability in Microsoft Internet Explorer which could result in remote code execution.
Additional Information
Microsoft Internet Explorer is a web browser available for multiple platforms.
Microsoft Internet Explorer is prone to a memory-corruption vulnerability. The issue occurs because the application accesses an object in memory that has been deleted or has not been properly allocated.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer versions 6, 7, 8, 9, 10, and 11 are affected.
Response
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
|
WebAttackMSIEMemoryCorruptionCVE-2013-38935
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a memory corruption vulnerability in Microsoft Internet Explorer which could result in remote code execution.
Additional Information
Microsoft Internet Explorer is a web browser available for multiple platforms.
Microsoft Internet Explorer is prone to a memory-corruption vulnerability. The issue occurs because the application accesses an object in memory that has been deleted or has not been properly allocated.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer versions 6, 7, 8, 9, 10, and 11 are affected.
Response
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
|
WebAttackMSIEMemoryCorruptionCVE-2013-38936
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a memory corruption vulnerability in Microsoft Internet Explorer which could result in remote code execution.
Additional Information
Microsoft Internet Explorer is a web browser available for multiple platforms.
Microsoft Internet Explorer is prone to a memory-corruption vulnerability. The issue occurs because the application accesses an object in memory that has been deleted or has not been properly allocated.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer versions 6, 7, 8, 9, 10, and 11 are affected.
Response
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
|
WebAttackMSIEMemoryCorruptionCVE-2013-38937
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a memory corruption vulnerability in Microsoft Internet Explorer which could result in remote code execution.
Additional Information
Microsoft Internet Explorer is a web browser available for multiple platforms.
Microsoft Internet Explorer is prone to a memory-corruption vulnerability. The issue occurs because the application accesses an object in memory that has been deleted or has not been properly allocated.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer versions 6, 7, 8, 9, 10, and 11 are affected.
Response
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
|
WebAttackMSIEMemoryCorruptionCVE-2015-2502
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature attempts to exploit a vulnerability in Internet Explorer.
Additional Information
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Updates are available. Please see the references or vendor advisory for more information.
Response
Updates are available. Please see the references or vendor advisory for more information.
|
WebAttackMSIEMetasploitExploitAttempt
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
|
WebAttackMSIEMSXMLCVE-2012-1889
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a maliciously crafted website attempting to exploit a remote code execution vulnerability in Microsoft XML Core Services.
Additional Information
A vulnerability exists in Internet Explorer when using a function of MSXML object that may be lead to crash or remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user and could take complete control of an affected system.
Affected
Microsoft Internet Explorer
Microsoft XML Core Services 3.0
Microsoft XML Core Services 4.0
Microsoft XML Core Services 5.0
Microsoft XML Core Services 6.0
|
WebAttackMSIEMSXMLCVE-2012-18892
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a maliciously crafted website attempting to exploit a remote code execution vulnerability in Microsoft XML Core Services.
Additional Information
A vulnerability exists in Internet Explorer when using a function of MSXML object that may be lead to crash or remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user and could take complete control of an affected system.
Affected
Microsoft Internet Explorer
Microsoft XML Core Services 3.0
Microsoft XML Core Services 4.0
Microsoft XML Core Services 5.0
Microsoft XML Core Services 6.0
|
WebAttackMSIEMSXMLCVE-2012-18893
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a maliciously crafted website attempting to exploit a remote code execution vulnerability in Microsoft XML Core Services.
Additional Information
Microsoft XML Core Services is prone to a remote code-execution vulnerability. The issue occurs when it attempts to access an object in memory that has not been initialized.
Affected
Microsoft Internet Explorer
Microsoft XML Core Services 3.0
Microsoft XML Core Services 4.0
Microsoft XML Core Services 5.0
Microsoft XML Core Services 6.0
|
WebAttackMSIEMSXMLCVE-2012-18894
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects a maliciously crafted website attempting to exploit a remote code execution vulnerability in Microsoft XML Core Services.
Additional Information
Microsoft XML Core Services is prone to a remote code-execution vulnerability. The issue occurs when it attempts to access an object in memory that has not been initialized.
Affected
Microsoft Internet Explorer
Microsoft XML Core Services 3.0
Microsoft XML Core Services 4.0
Microsoft XML Core Services 5.0
Microsoft XML Core Services 6.0
|
WebAttackMSIEObjectTypeCVE-2003-0344
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a vulnerability in MS Internet Exporer OBJECT tags.
Additional Information
Microsoft Internet Explorer contains a boundary condition error in the handling of OBJECT tags within web pages.
The problem occurs when Internet Explorer determines the object type.
If Internet Explorer is used to view a web page containing an OBJECT tag with excessive data used for the 'type' parameter, an internal memory buffer will be overrun.
If the object 'type' field includes extraneous '/' characters, Internet Explorer will convert the last '/' character to '_/_' after the string length is computed. This will allow a malicious attacker to corrupt sensitive stack memory with attacker-supplied values.
Successful exploitation would result in either Internet Explorer failing or the execution of arbitrary attacker-supplied code. Any code would be executed in the security context of the current user.
This vulnerability was reported to affect Internet Explorer 5.01, 5.5, and 6.0. Earlier versions may also be affected, however, they are no longer supported by Microsoft.
**Update: It has been reported that this vulnerability was not addressed by (MS03-020) in specific language environments, specifically those that implement double-byte character sets. Yuu Arai of SNS reported that the buffer overflow was still exploitable on Japanese Internet Explorer 6 Service Pack 1, after the update described in (MS03-020) was installed. The issue presents itself when an HTML file which includes a double-byte character string of excessive length as the Type property of an Object Tag, is processed by the vulnerable browser. This vulnerability has been addressed in the (MS03-032)/(822925) Internet Explorer cumulative patch.
Affected
Microsoft Internet Explorer 5.0.1, 5.0.1 SP1, 5.0.1 SP2, 5.0.1 SP3, 5.5, 5.5 SP1, 5.5 SP2, 6.0, 6.0 SP1
Response
The vendor has released a cumulative patch to address this issue
|
WebAttackMSIEOptionElementUAECVE-2011-1996
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a use after free vulnerability on Microsoft Internet Explorer which may lead to remote code execution.
Additional Information
Microsoft Internet Explorer is a web browser available for Microsoft Windows platforms.
Microsoft Internet Explorer is prone to a remote memory-corruption vulnerability when handling a select element. The issue occurs when the application attempts to access a dereferenced cache memory address.
An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage.
Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks may cause denial-of-service conditions.
Affected
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7.0
|
WebAttackMSIEPropertyAttackCVE-2007-0945
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempted attack against Internet Explorer caused by a maliciously crafted website.
Additional Information
Microsoft Internet Explorer is prone to remote code-execution vulnerability.
The problem occurs when viewing a page containing a malformed 'property' method call. An attacker can trigger this issue by tricking an unsuspecting victim into viewing a malicious page.
A remote attacker can exploit this issue to execute arbitrary code in the context of the user running the vulnerable application.
Affected
Microsoft Internet Explorer 6.0, 6.0 SP1, 6.0 SP2, 7.0, 7.0 beta2, 7.0.5730.11
Response
Microsoft has released security bulletin MS07-027 with fixes to address this issue. Please see the referenced bulletin for information on obtaining fixes.
|
WebAttackMSIEReconAttack
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit the Security Bypass Vulnerability attack against Windows Internet Explorer.
Additional Information
Attackers can exploit this issue to bypass certain security restrictions which may lead to further attacks.
Affected
Internet Explorer
|
WebAttackMSIEReconAttack2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit the Security Bypass Vulnerability attack against Windows Internet Explorer.
Additional Information
Attackers can exploit this issue to bypass certain security restrictions which may lead to further attacks.
Affected
Internet Explorer
|
WebAttackMSIERemoteCodeExec
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a Stack Overflow vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a browser available for multiple platforms.
The browser is prone to a remote denial-of-service vulnerability. Specifically, this issue occurs due to a stack overflow condition when processing a crafted HTML page.
To exploit this issue, an attacker must entice an unsuspecting user to visit a malicious site.
Successful exploits can allow attackers to crash the affected browser, resulting in denial-of-service conditions. Given the nature of this issue, attackers may also be able to corrupt process memory and execute arbitrary code, but this has not been confirmed.
Affected
Various Microsoft Internet Explorer versions
|
Web Attack: MSIE RevealTrans Transition Property BO CVE-2006-3605
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempted attack against Internet Explorer caused by a maliciously crafted website.
Additional Information
Microsoft Internet Explorer is prone to a denial-of-service vulnerability.
This issue is triggered when an attacker convinces a victim user to visit a malicious website. Specifically, the vulnerability presents itself when the browser processes the 'DXImageTransform.Microsoft.RevealTrans' object. An attacker can trigger a NULL-pointer dereference by setting the 'Transition' property of this object to true.
A successful attack can cause Microsoft Internet Explorer to crash, effectively denying service to legitimate users.
Affected
Microsoft Internet Explorer 6.0, 6.0 SP1
Response
Upgrade to the latest version of Internet Explorer and ensure that all vendor supplied patches have been applied.
|
WebAttackMSIESameIDPropertyCVE-2012-1875
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a browser for the Windows operating system.
Internet Explorer is prone to a remote code-execution vulnerability. Specifically, the problem occurs when accessing an object that has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Microsoft Internet Explorer 8
|
WebAttackMSIESameIDPropertyCVE-2012-18752
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a browser for the Windows operating system.
Internet Explorer is prone to a remote code-execution vulnerability. Specifically, the problem occurs when accessing an object that has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Microsoft Internet Explorer 8
|
WebAttackMSIEStaticHTMLMethodRCE
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
A vulnerability exists in IE8 in the toStaticHTML API that may result in a potential XSS attack.
Additional Information
A vulnerability exists in IE8 in the toStaticHTML API that may result in a potential XSS attack.
Affected
NA
Response
NA
|
WebAttackMSIEUseAfterFreeCVE-2012-4792
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
|
WebAttackMSIEUseAfterFreeCVE-2012-47922
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
|
WebAttackMSIEUseAfterFreeCVE-2012-47923
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
|
WebAttackMSIEUseAfterFreeCVE-2012-47924
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
|
WebAttackMSIEUseAfterFreeCVE-2012-47925
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
|
WebAttackMSIEUseAfterFreeCVE-2012-47926
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
|
Web Attack: MSIE Use After Free CVE-2012-4792 7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
|
WebAttackMSIEUseAfterFreeCVE-2012-47928
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
|
WebAttackMSIEUseAfterFreeCVE-2012-47929
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
Affected
Microsoft Internet Explorer versions 6, 7, and 8 are affected.
|
WebAttackMSIEUseAfterFreeCVE-2013-0025
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because it accesses a already freed 'CParaElement' node when a CDoc relayout is performed.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer version 8 is affected.
Affected
Microsoft Internet Explorer 8
|
WebAttackMSIEUseAfterFreeCVE-2013-1347
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit the Use-After-Free vulnerability attack against Windows Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already freed.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Microsoft Internet Explorer version 8 is affected.
Response
Upgrade to the latest version of Internet Explorer.
|
WebAttackMSIEUseAfterFreeCVE-2013-13472
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit the Use-After-Free vulnerability attack against Windows Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already freed.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Microsoft Internet Explorer version 8 is affected.
Response
Upgrade to the latest version of Internet Explorer.
|
Web Attack: MSIE Use After Free CVE-2013-1347 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit the Use-After-Free vulnerability attack against Windows Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already freed.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Microsoft Internet Explorer version 8 is affected.
Response
Upgrade to the latest version of Internet Explorer.
|
WebAttackMSIEUseAfterFreeCVE-2013-13474
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit the Use-After-Free vulnerability attack against Windows Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already freed.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Microsoft Internet Explorer version 8 is affected.
Response
Upgrade to the latest version of Internet Explorer.
|
WebAttackMSIEUseAfterFreeCVE-2013-38932
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue occurs in the 'CMarkup' component of the 'MSHTML' library.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer 10 is affected.
Affected
Microsoft Internet Explorer 10
|
WebAttackMSIEUseAfterFreeCVE-2014-0282
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature attempts to exploit a vulnerability in Internet Explorer.
Additional Information
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer 6, 7, 8, 9, 10, and 11 are vulnerable.
Response
Updates are available. Please see the references or vendor advisory for more information.
|
WebAttackMSIEUseAfterFreeCVE-2014-0322_3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is a Web browser available for Microsoft Windows.
Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue occurs in the 'CMarkup' component of the 'MSHTML' library.
Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage.
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Microsoft Internet Explorer 10 is affected.
Affected
Microsoft Internet Explorer 10
|
WebAttackMSIEUseAfterFreeCVE-2014-1762
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIEUseAfterFreeCVE-2014-1772
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIEUseAfterFreeCVE-2014-1776
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is prone to a remote code execution vulnerability that affects versions from 6-11.
Affected
Internet Explorer versions 6,7,8,9,10,11
|
Web Attack: MSIE Use After Free CVE-2014-1776 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer.
Additional Information
Microsoft Internet Explorer is prone to a remote code execution vulnerability that affects versions from 6-11.
Affected
Internet Explorer versions 6,7,8,9,10,11
|
WebAttackMSIEUseAfterFreeCVE-2014-1785
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature attempts to exploit a vulnerability in Internet Explorer.
Additional Information
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer 6, 7, 8, 9, 10, and 11 are vulnerable.
Response
Updates are available. Please see the references or vendor advisory for more information.
|
WebAttackMSIEUseAfterFreeCVE-2014-1791
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Additional Information
This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques.
Affected
Windows.
Response
This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
|
WebAttackMSIEUseAfterFreeCVE-2014-1815
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature attempts to exploit a vulnerability in Internet Explorer.
Additional Information
Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Affected
Internet Explorer 6, 7, 8, 9, 10, and 11 are vulnerable.
Response
Updates are available. Please see the references or vendor advisory for more information.
|
WebAttackMSIEXMLDOMActiveXCVE-2013-7331
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a Information Disclosure vulnerability in Microsoft XMLDOM ActiveX.
Additional Information
Microsoft XMLDOM ActiveX control is prone to multiple information-disclosure vulnerabilities. Specifically, these issues affect unspecified methods that will allow website administrator to gain access to sensitive information through error codes.
Note: Very limited information is currently available regarding this issue. We will update this BID as more information emerges.
Attackers can exploit this issue by enticing an unsuspecting user to view a malicious webpage.
Successful exploits will allow attackers to obtain sensitive information like local drive letters, files, and directory names; that may aid in further attacks.
Affected
Microsoft Windows 8.1 and earlier
|
Web Attack: MSIE XMLDOM ActiveX CVE-2013-7331 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a Information Disclosure vulnerability in Microsoft XMLDOM ActiveX.
Additional Information
Microsoft XMLDOM ActiveX control is prone to multiple information-disclosure vulnerabilities. Specifically, these issues affect unspecified methods that will allow website administrator to gain access to sensitive information through error codes.
Note: Very limited information is currently available regarding this issue. We will update this BID as more information emerges.
Attackers can exploit this issue by enticing an unsuspecting user to view a malicious webpage.
Successful exploits will allow attackers to obtain sensitive information like local drive letters, files, and directory names; that may aid in further attacks.
Affected
Microsoft Windows 8.1 and earlier
|
Web Attack: MSIE XMLDOM ActiveX CVE-2013-7331 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a Information Disclosure vulnerability in Microsoft XMLDOM ActiveX.
Additional Information
Microsoft XMLDOM ActiveX control is prone to multiple information-disclosure vulnerabilities. Specifically, these issues affect unspecified methods that will allow website administrator to gain access to sensitive information through error codes.
Note: Very limited information is currently available regarding this issue. We will update this BID as more information emerges.
Attackers can exploit this issue by enticing an unsuspecting user to view a malicious webpage.
Successful exploits will allow attackers to obtain sensitive information like local drive letters, files, and directory names; that may aid in further attacks.
Affected
Microsoft Windows 8.1 and earlier
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.