text
stringlengths
0
383k
WebAttackMSIECVE-2015-1718 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1730 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1732 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1733 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1736 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1741 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1742 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1748 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-1752 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
Web Attack: MSIE CVE-2015-2419 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Additional Information Microsoft Internet Explorer is a browser for the Windows operating system. Internet Explorer is prone to a remote code-execution vulnerability. Specifically, this issue occurs because the JScript engine fails to properly access an object in memory. Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks may cause denial-of-service conditions. Affected Multiple versions of Internet Explorer
WebAttackMSIECVE-2015-24192 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Additional Information Microsoft Internet Explorer is a browser for the Windows operating system. Internet Explorer is prone to a remote code-execution vulnerability. Specifically, this issue occurs because the JScript engine fails to properly access an object in memory. Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks may cause denial-of-service conditions. Affected Multiple versions of Internet Explorer
WebAttackMSIECVE-2015-24193 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Additional Information Microsoft Internet Explorer is a browser for the Windows operating system. Internet Explorer is prone to a remote code-execution vulnerability. Specifically, this issue occurs because the JScript engine fails to properly access an object in memory. Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks may cause denial-of-service conditions. Affected Multiple versions of Internet Explorer
WebAttackMSIECVE-2015-6048 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Signature detects attempt to exploit Memory Corruption vulnerability of MS Internet Explorer. Additional Information Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability", a different vulnerability than CVE-2015-6049. Affected Microsoft Internet Explorer 7 through 11
WebAttackMSIECVE-2015-6078 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-6085 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-6140 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-6141 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2015-6163 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer and Edge are prone to a remote memory-corruption vulnerability. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. The following products are vulnerable: Internet Explorer 8, 9, 10 and 11 Edge Affected Internet Explorer 8, 9, 10 and 11 Edge
WebAttackMSIECVE-2016-0001 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2016-3205 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2017-0037 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2017-0208 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIECVE-2017-8496 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Edge.
WebAttackMSIECVE-2017-8497 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Additional Information Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions. Affected Microsoft Edge.
WebAttackMSIECVE-2017-8529 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Microsoft Internet Explorer and Edge are prone to an information disclosure vulnerability because they fail to properly handle objects in the memory. An attacker can exploit this issue to detect specific files on the system. Additional Information Microsoft Internet Explorer and Edge are prone to an information disclosure vulnerability because they fail to properly handle objects in the memory. An attacker can exploit this issue to detect specific files on the system. Affected Internet Explorer 9, 10, 11 and Edge are vulnerable.
WebAttackMSIECVE-2018-8242 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to exploit CVE-2018-8242. Remote Memory Corruption Vulnerability. Additional Information Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial of service conditions Affected Internet Explorer 9, 10 and 11 are vulnerable
WebAttackMSIECVE-2018-8373 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote memory corruption vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is prone to a remote memory-corruption vulnerability. Specifically, this issue occurs because the browser fails to properly handle objects in memory. This may allow attackers to embed an ActiveX control marked 'safe for initialization' in an application or Microsoft Office document that hosts the browser rendering engine. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the affected application. Affected Microsoft Internet Explorer 9 + Microsoft Windows 7 + Microsoft Windows 7 + Microsoft Windows 7 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for 32-bit Systems 0 + Microsoft Windows 7 for 32-bit Systems 0 + Microsoft Windows 7 for 32-bit Systems 0 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 7 for x64-based Systems 0 + Microsoft Windows 7 for x64-based Systems 0 + Microsoft Windows 7 for x64-based Systems 0 + Microsoft Windows 7 Home Premium - Sp1 X64 + Microsoft Windows 7 Home Premium - Sp1 X64 + Microsoft Windows 7 Home Premium - Sp1 X64 + Microsoft Windows 7 Home Premium - Sp1 X32 + Microsoft Windows 7 Home Premium - Sp1 X32 + Microsoft Windows 7 Home Premium - Sp1 X32 + Microsoft Windows Server 2008 R2 + Microsoft Windows Server 2008 R2 + Microsoft Windows Server 2008 R2 + Microsoft Windows Server 2008 for 32-bit Systems SP2 + Microsoft Windows Server 2008 for 32-bit Systems SP2 + Microsoft Windows Server 2008 for 32-bit Systems SP2 + Microsoft Windows Server 2008 for 32-bit Systems 0 + Microsoft Windows Server 2008 for 32-bit Systems 0 + Microsoft Windows Server 2008 for 32-bit Systems 0 + Microsoft Windows Server 2008 for x64-based Systems SP2 + Microsoft Windows Server 2008 for x64-based Systems SP2 + Microsoft Windows Server 2008 for x64-based Systems SP2 + Microsoft Windows Server 2008 for x64-based Systems 0 + Microsoft Windows Server 2008 for x64-based Systems 0 + Microsoft Windows Server 2008 for x64-based Systems 0 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Vista SP2 + Microsoft Windows Vista SP2 + Microsoft Windows Vista SP2 + Microsoft Windows Vista SP1 + Microsoft Windows Vista SP1 + Microsoft Windows Vista SP1 + Microsoft Windows Vista x64 Edition SP2 + Microsoft Windows Vista x64 Edition SP2 + Microsoft Windows Vista x64 Edition SP2 + Microsoft Windows Vista x64 Edition SP1 + Microsoft Windows Vista x64 Edition SP1 + Microsoft Windows Vista x64 Edition SP1 + Microsoft Windows Vista x64 Edition 0 + Microsoft Windows Vista x64 Edition 0 + Microsoft Windows Vista x64 Edition 0 Microsoft Internet Explorer 11 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 Version 1607 for 32-bit Systems 0 + Microsoft Windows 10 Version 1607 for 32-bit Systems 0 + Microsoft Windows 10 Version 1607 for 32-bit Systems 0 + Microsoft Windows 10 Version 1607 for x64-based Systems 0 + Microsoft Windows 10 Version 1607 for x64-based Systems 0 + Microsoft Windows 10 Version 1607 for x64-based Systems 0 + Microsoft Windows 10 version 1703 for 32-bit Systems 0 + Microsoft Windows 10 version 1703 for 32-bit Systems 0 + Microsoft Windows 10 version 1703 for 32-bit Systems 0 + Microsoft Windows 10 version 1703 for x64-based Systems 0 + Microsoft Windows 10 version 1703 for x64-based Systems 0 + Microsoft Windows 10 version 1703 for x64-based Systems 0 + Microsoft Windows 10 version 1709 for 32-bit Systems 0 + Microsoft Windows 10 version 1709 for 32-bit Systems 0 + Microsoft Windows 10 version 1709 for x64-based Systems 0 + Microsoft Windows 10 version 1709 for x64-based Systems 0 + Microsoft Windows 10 Version 1803 for 32-bit Systems 0 + Microsoft Windows 10 Version 1803 for x64-based Systems 0 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 8.1 for 32-bit Systems 0 + Microsoft Windows 8.1 for 32-bit Systems 0 + Microsoft Windows 8.1 for 32-bit Systems 0 + Microsoft Windows 8.1 for 32-bit Systems 0 + Microsoft Windows 8.1 for 32-bit Systems 0 + Microsoft Windows 8.1 for x64-based Systems 0 + Microsoft Windows 8.1 for x64-based Systems 0 + Microsoft Windows 8.1 for x64-based Systems 0 + Microsoft Windows 8.1 for x64-based Systems 0 + Microsoft Windows 8.1 for x64-based Systems 0 + Microsoft Windows Rt 8.1 - + Microsoft Windows Rt 8.1 - + Microsoft Windows Rt 8.1 - + Microsoft Windows Rt 8.1 - + Microsoft Windows Rt 8.1 - + Microsoft Windows Server 2016 + Microsoft Windows Server 2016 + Microsoft Windows Server 2016 + Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2 + Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2 + Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2 + Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2012 R2 0 + Microsoft Windows Server 2012 R2 0 + Microsoft Windows Server 2012 R2 0 + Microsoft Windows Server 2012 R2 0 + Microsoft Windows Server 2012 R2 0 Microsoft Internet Explorer 10 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 8 for 32-bit Systems 0 + Microsoft Windows 8 for 32-bit Systems 0 + Microsoft Windows 8 for x64-based Systems 0 + Microsoft Windows 8 for x64-based Systems 0 + Microsoft Windows RT 0 + Microsoft Windows RT 0 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2012 0 + Microsoft Windows Server 2012 0 + Microsoft Windows Server 2012 0
WebAttackMSIEDblBackslashCHMFileExecCVE-2004-0475 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a vulnerability in Microsoft Internet Explorer which allows the execution of .CHM files from untrusted zones. Additional Information A vulnerability has been reported in Microsoft Internet Explorer that may permit unauthorized execution of locally stored compiled help files (.CHM). This issue reportedly permits a web page within the Internet Security Zone to execute .CHM files that are stored on the local system. Due to restrictions implemented in previous security updates, this type of access should only be permitted from the Local Zone. This vulnerability has been demonstrated using the showHelp() method to reference a local .CHM file, in a manner similar to the vulnerability described in BID 9320. It is possible that there are other means of demonstrating this behavior. It should also be noted that this issue could also be used to cause HTML pages embedded in .CHM files to be interpreted in the Local Zone. This issue could be exploited with other existing vulnerabilities, such as BID 9658 to execute arbitrary code on the system. Exploitation would require the attacker to place a malicious .CHM file on the system through exploitation of other issues and then execute it through exploitation of this issue. Note: This BID was created because further research has determined it to be a distinct issue from the vulnerability described in 10344. The primary difference is that BID 10344 allows execution of files from the Local Zone only, while this issue permits a remote web page to directly reference a .CHM file stored on a client system from the Internet Zone. BID 10344 describes an issue that permits unauthorized access to local resources via CODEBASE. Affected Microsoft Internet Explorer 6.0 SP1 Response Upgrade to the latest version of Microsoft Internet Explorer and apply all available patches.
WebAttackMSIEEdgeCVE-2018-0891 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit information disclosure vulnerability in Microsoft IE and Edge. Additional Information Microsoft Internet Explorer and Edge are web browsers available for Windows. Microsoft Internet Explorer and Edge are prone to an information disclosure vulnerability. Specifically, this issue occurs because the applications fail to properly handle objects in memory. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted web page. Successful exploits will allow attackers to obtain sensitive information that may aid in further attacks. Affected Microsoft Internet Explorer 11 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 Version 1607 for 32-bit Systems 0 + Microsoft Windows 10 Version 1607 for 32-bit Systems 0 + Microsoft Windows 10 Version 1607 for x64-based Systems 0 + Microsoft Windows 10 Version 1607 for x64-based Systems 0 + Microsoft Windows 10 version 1703 for 32-bit Systems 0 + Microsoft Windows 10 version 1703 for 32-bit Systems 0 + Microsoft Windows 10 version 1703 for x64-based Systems 0 + Microsoft Windows 10 version 1703 for x64-based Systems 0 + Microsoft Windows 10 version 1709 for 32-bit Systems 0 + Microsoft Windows 10 version 1709 for x64-based Systems 0 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for 32-bit Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 7 for x64-based Systems SP1 + Microsoft Windows 8.1 for 32-bit Systems 0 + Microsoft Windows 8.1 for 32-bit Systems 0 + Microsoft Windows 8.1 for 32-bit Systems 0 + Microsoft Windows 8.1 for 32-bit Systems 0 + Microsoft Windows 8.1 for x64-based Systems 0 + Microsoft Windows 8.1 for x64-based Systems 0 + Microsoft Windows 8.1 for x64-based Systems 0 + Microsoft Windows 8.1 for x64-based Systems 0 + Microsoft Windows Rt 8.1 - + Microsoft Windows Rt 8.1 - + Microsoft Windows Rt 8.1 - + Microsoft Windows Rt 8.1 - + Microsoft Windows Server 2016 + Microsoft Windows Server 2016 + Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2 + Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2 + Microsoft Windows Server 2008 R2 for Itanium-based Systems SP2 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2008 R2 for x64-based Systems SP1 + Microsoft Windows Server 2012 R2 0 + Microsoft Windows Server 2012 R2 0 + Microsoft Windows Server 2012 R2 0 + Microsoft Windows Server 2012 R2 0 Microsoft Edge 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for 32-bit Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for 32-bit Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 version 1511 for x64-based Systems 0 + Microsoft Windows 10 Version 1607 for 32-bit Systems 0 + Microsoft Windows 10 Version 1607 for 32-bit Systems 0 + Microsoft Windows 10 Version 1607 for 32-bit Systems 0 + Microsoft Windows 10 Version 1607 for x64-based Systems 0 + Microsoft Windows 10 Version 1607 for x64-based Systems 0 + Microsoft Windows 10 Version 1607 for x64-based Systems 0 + Microsoft Windows 10 version 1703 for 32-bit Systems 0 + Microsoft Windows 10 version 1703 for 32-bit Systems 0 + Microsoft Windows 10 version 1703 for x64-based Systems 0 + Microsoft Windows 10 version 1703 for x64-based Systems 0 + Microsoft Windows 10 version 1709 for 32-bit Systems 0 + Microsoft Windows 10 version 1709 for 32-bit Systems 0 + Microsoft Windows 10 version 1709 for x64-based Systems 0 + Microsoft Windows 10 version 1709 for x64-based Systems 0 + Microsoft Windows Server 2016 0 + Microsoft Windows Server 2016 for x64-based Systems 0 + Microsoft Windows Server 2016 for x64-based Systems 0 + Microsoft Windows Server 2016 for x64-based Systems 0 Microsoft ChakraCore 0
WebAttackMSIEEventUser-After-FreeCVE-2012-2546 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue occurs because the application accesses an object in memory that has not been correctly initialized or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 9 is affected. Affected Microsoft Internet Explorer 9
WebAttackMSIEEXEinIMGCodeExecution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the use of the Shell:startup function that is being hosted by a compromised web server. Additional Information Microsoft Internet Explorer is reported prone to a vulnerability that may allow unauthorized installation of malicious executables. Proof-of-concepts have been released to demonstrate a vulnerability that may be exploited to entice a victim user to install a file on a victim's computer with some degree of user interaction. Specifically, an executable may be embedded in a Web page and presented as an image object to the user. Another frame can be loaded that references a folder on the victim's file system via the anchorClick style behavior. The page will be obfuscated in such a way as to disguise the fact that when the user clicks on the image object it will implicitly drag it to the folder that has been specified. It has been demonstrated that various other measures may be taken to limit the amount of user interaction required but the exploit hinges on the user interacting via mouse events with an object within the Web page that represents an executable to cause the executable to be moved to the folder that has been loaded in the obfuscated secondary frame. An attacker may exploit this vulnerability to influence a target victim into unknowingly installing software in a location on the computer such as the startup foler. If the malicious executable is placed in the startup folder, it will run when the system is restarted. Affected Avaya DefinityOne Media Servers Avaya IP600 Media Servers Avaya Modular Messaging (MSS) 1.1, 2.0 Avaya S3400 Message Application Server Avaya S8100 Media Servers Microsoft Internet Explorer 5.0.1, 5.0.1 SP1, 5.0.1 SP2, 5.0.1 SP3, 5.0.1 SP4, 5.5, 5.5 SP1, 5.5 SP2, 6.0, 6.0 SP1, 6.0 SP2 Microsoft Windows 2000 Advanced Server SP1, SP2, SP3, SP4 Microsoft Windows 2000 Datacenter Server SP1, SP2, SP3, SP4 Microsoft Windows 2000 Professional SP1, SP2, SP3, SP4 Microsoft Windows 2000 Server SP1, SP2, SP3, SP4 Microsoft Windows 98 Microsoft Windows 98SE Microsoft Windows ME Microsoft Windows Server 2003 Datacenter Edition Microsoft Windows Server 2003 Datacenter Edition Itanium Microsoft Windows Server 2003 Enterprise Edition Microsoft Windows Server 2003 Enterprise Edition Itanium Microsoft Windows Server 2003 Standard Edition Microsoft Windows Server 2003 Web Edition Microsoft Windows XP 64-bit Edition SP1 Microsoft Windows XP 64-bit Edition Version 2003 Microsoft Windows XP Home SP1, SP2 Microsoft Windows XP Media Center Edition SP1, SP2 Microsoft Windows XP Professional SP1, SP2 Microsoft Windows XP Tablet PC Edition SP1, SP2 Nortel Networks IP softphone 2050 Nortel Networks Mobile Voice Client 2050 Nortel Networks Optivity Telephony Manager (OTM) Nortel Networks Symposium Web Center Portal (SWCP) Nortel Networks Symposium Web Client Response Microsoft has released a cumulative update for supported versions of Internet Explorer to address this and other vulnerabilities. Additional Mitigation Do not accept communications that originate from unknown or untrusted sources. Attacks may occur through email. Users should avoid accepting or opening email that appears suspicious or originates from an unfamiliar source. As an additional security measure, client support for HTML email should be disabled.
WebAttackMSIEFragusJavaClass Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a CrimePack toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information CrimePack is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various
WebAttackMSIEGenericBrowserExploit10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIEGenericBrowserExploit11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIEGenericBrowserExploit12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIEGenericBrowserExploit2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIEGenericBrowserExploit3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIEGenericBrowserExploit4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIEGenericBrowserExploit5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIEGenericBrowserExploit6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIEGenericBrowserExploit8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIEGenericBrowserExploit9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIEImageArraysUse-After-FreeCVE-2012-4969 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue is related to the manipulation of image arrays and affects the 'CMshtmlEd::Exec()' function. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected. Affected Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
WebAttackMSIEImageArraysUse-After-FreeCVE-2012-49692 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue is related to the manipulation of image arrays and affects the 'CMshtmlEd::Exec()' function. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected. Affected Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
WebAttackMSIEImageArraysUse-After-FreeCVE-2012-49693 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue is related to the manipulation of image arrays and affects the 'CMshtmlEd::Exec()' function. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected. Affected Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
WebAttackMSIEImageArraysUse-After-FreeCVE-2012-49694 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue is related to the manipulation of image arrays and affects the 'CMshtmlEd::Exec()' function. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected. Affected Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
WebAttackMSIEImageArraysUse-After-FreeCVE-2012-49696 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue is related to the manipulation of image arrays and affects the 'CMshtmlEd::Exec()' function. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected. Affected Microsoft Internet Explorer versions 6, 7, 8, and 9 are affected.
WebAttackMSIEInstallEngineCtl.HeapBO Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to overflow a buffer in the SetCifFile ActiveX function call by sending an oversized parameter. Additional Information A remotely exploitable buffer overflow vulnerability exists in the Microsoft Internet Explorer Install Engine ActiveX control. This vulnerability is caused by insufficient bounds checking of arguments passed to the control. The vulnerability may be exploited to execute arbitrary code in the context of the client user. A remotely exploitable buffer overflow vulnerability exists in the Microsoft Internet Explorer Install Engine ActiveX control. The Install Engine is part of the Active Setup Technology included in Internet Explorer, which allows an installation program to retrieve additional files from the Internet that are required for initialization. This vulnerability is caused by insufficient bounds checking of arguments passed to the control. Specifically, the length of the arguments is not validated before being copied into an internal buffer. This control is marked Safe For Scripting, meaning that an arbitrary Web site may invoke the control and access its methods. The vulnerability may be triggered by passing malformed arguments to affected methods. Affected Avaya DefinityOne Media Servers Avaya IP600 Media Servers Avaya Modular Messaging (MSS) 1.1, 2.0 Avaya S3400 Message Application Server Avaya S8100 Media Servers Microsoft Internet Explorer 5.0.1, 5.0.1 SP1, 5.0.1 SP2, 5.0.1 SP3, 5.0.1 SP4, 5.5, 5.5 SP1, 5.5 SP2, 6.0, 6.0 SP1 Response Workarounds This issue can be eliminated by disabling the vulnerable ActiveX control. Solutions Microsoft has released a cumulative update for supported versions of Internet Explorer to address this and other vulnerabilities. Deny by default, do not follow links: Web users should be wary of visiting sites of questionable integrity or following links provided by unfamiliar or untrusted sources. Use of least privilege, run client software with the least privileges: Perform all non-administrative activities as an unprivileged user with minimal access rights. This will limit the impact of client-side vulnerabilities. Default config, set Web browser security: Disable support for client-side scripting and Active Content in the Web browser Internet Zone. This may limit exposure to this and other client-side vulnerabilities.
WebAttackMSIELayoutMemoryCorruption Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to exploit a memory corruption vulnerability in Internet Explorer. Additional Information A memory corruption vulnerability in IE when handling layouts may lead to remote code execution. Affected various
WebAttackMSIELayoutUse-After-FreeCVE-2012-2548 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, the issue occurs because the application accesses an object in memory that has not been correctly initialized or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 9 is affected. Affected Microsoft Internet Explorer 9
WebAttackMSIEMemoryCorruptionCVE-2013-3893 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a memory corruption vulnerability in Microsoft Internet Explorer which could result in remote code execution. Additional Information Microsoft Internet Explorer is a web browser available for multiple platforms. Microsoft Internet Explorer is prone to a memory-corruption vulnerability. The issue occurs because the application accesses an object in memory that has been deleted or has not been properly allocated. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer versions 6, 7, 8, 9, 10, and 11 are affected. Response Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
WebAttackMSIEMemoryCorruptionCVE-2013-38932 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a memory corruption vulnerability in Microsoft Internet Explorer which could result in remote code execution. Additional Information Microsoft Internet Explorer is a web browser available for multiple platforms. Microsoft Internet Explorer is prone to a memory-corruption vulnerability. The issue occurs because the application accesses an object in memory that has been deleted or has not been properly allocated. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer versions 6, 7, 8, 9, 10, and 11 are affected. Response Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Web Attack: MSIE Memory Corruption CVE-2013-3893 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a memory corruption vulnerability in Microsoft Internet Explorer which could result in remote code execution. Additional Information Microsoft Internet Explorer is a web browser available for multiple platforms. Microsoft Internet Explorer is prone to a memory-corruption vulnerability. The issue occurs because the application accesses an object in memory that has been deleted or has not been properly allocated. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer versions 6, 7, 8, 9, 10, and 11 are affected. Response Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Web Attack: MSIE Memory Corruption CVE-2013-3893 4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a memory corruption vulnerability in Microsoft Internet Explorer which could result in remote code execution. Additional Information Microsoft Internet Explorer is a web browser available for multiple platforms. Microsoft Internet Explorer is prone to a memory-corruption vulnerability. The issue occurs because the application accesses an object in memory that has been deleted or has not been properly allocated. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer versions 6, 7, 8, 9, 10, and 11 are affected. Response Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
WebAttackMSIEMemoryCorruptionCVE-2013-38935 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a memory corruption vulnerability in Microsoft Internet Explorer which could result in remote code execution. Additional Information Microsoft Internet Explorer is a web browser available for multiple platforms. Microsoft Internet Explorer is prone to a memory-corruption vulnerability. The issue occurs because the application accesses an object in memory that has been deleted or has not been properly allocated. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer versions 6, 7, 8, 9, 10, and 11 are affected. Response Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
WebAttackMSIEMemoryCorruptionCVE-2013-38936 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a memory corruption vulnerability in Microsoft Internet Explorer which could result in remote code execution. Additional Information Microsoft Internet Explorer is a web browser available for multiple platforms. Microsoft Internet Explorer is prone to a memory-corruption vulnerability. The issue occurs because the application accesses an object in memory that has been deleted or has not been properly allocated. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer versions 6, 7, 8, 9, 10, and 11 are affected. Response Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
WebAttackMSIEMemoryCorruptionCVE-2013-38937 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a memory corruption vulnerability in Microsoft Internet Explorer which could result in remote code execution. Additional Information Microsoft Internet Explorer is a web browser available for multiple platforms. Microsoft Internet Explorer is prone to a memory-corruption vulnerability. The issue occurs because the application accesses an object in memory that has been deleted or has not been properly allocated. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer versions 6, 7, 8, 9, 10, and 11 are affected. Response Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
WebAttackMSIEMemoryCorruptionCVE-2015-2502 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature attempts to exploit a vulnerability in Internet Explorer. Additional Information Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Updates are available. Please see the references or vendor advisory for more information. Response Updates are available. Please see the references or vendor advisory for more information.
WebAttackMSIEMetasploitExploitAttempt Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, and 8 are affected. Affected Microsoft Internet Explorer versions 6, 7, and 8 are affected.
WebAttackMSIEMSXMLCVE-2012-1889 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a maliciously crafted website attempting to exploit a remote code execution vulnerability in Microsoft XML Core Services. Additional Information A vulnerability exists in Internet Explorer when using a function of MSXML object that may be lead to crash or remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user and could take complete control of an affected system. Affected Microsoft Internet Explorer Microsoft XML Core Services 3.0 Microsoft XML Core Services 4.0 Microsoft XML Core Services 5.0 Microsoft XML Core Services 6.0
WebAttackMSIEMSXMLCVE-2012-18892 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a maliciously crafted website attempting to exploit a remote code execution vulnerability in Microsoft XML Core Services. Additional Information A vulnerability exists in Internet Explorer when using a function of MSXML object that may be lead to crash or remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user and could take complete control of an affected system. Affected Microsoft Internet Explorer Microsoft XML Core Services 3.0 Microsoft XML Core Services 4.0 Microsoft XML Core Services 5.0 Microsoft XML Core Services 6.0
WebAttackMSIEMSXMLCVE-2012-18893 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a maliciously crafted website attempting to exploit a remote code execution vulnerability in Microsoft XML Core Services. Additional Information Microsoft XML Core Services is prone to a remote code-execution vulnerability. The issue occurs when it attempts to access an object in memory that has not been initialized. Affected Microsoft Internet Explorer Microsoft XML Core Services 3.0 Microsoft XML Core Services 4.0 Microsoft XML Core Services 5.0 Microsoft XML Core Services 6.0
WebAttackMSIEMSXMLCVE-2012-18894 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a maliciously crafted website attempting to exploit a remote code execution vulnerability in Microsoft XML Core Services. Additional Information Microsoft XML Core Services is prone to a remote code-execution vulnerability. The issue occurs when it attempts to access an object in memory that has not been initialized. Affected Microsoft Internet Explorer Microsoft XML Core Services 3.0 Microsoft XML Core Services 4.0 Microsoft XML Core Services 5.0 Microsoft XML Core Services 6.0
WebAttackMSIEObjectTypeCVE-2003-0344 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a vulnerability in MS Internet Exporer OBJECT tags. Additional Information Microsoft Internet Explorer contains a boundary condition error in the handling of OBJECT tags within web pages. The problem occurs when Internet Explorer determines the object type. If Internet Explorer is used to view a web page containing an OBJECT tag with excessive data used for the 'type' parameter, an internal memory buffer will be overrun. If the object 'type' field includes extraneous '/' characters, Internet Explorer will convert the last '/' character to '_/_' after the string length is computed. This will allow a malicious attacker to corrupt sensitive stack memory with attacker-supplied values. Successful exploitation would result in either Internet Explorer failing or the execution of arbitrary attacker-supplied code. Any code would be executed in the security context of the current user. This vulnerability was reported to affect Internet Explorer 5.01, 5.5, and 6.0. Earlier versions may also be affected, however, they are no longer supported by Microsoft. **Update: It has been reported that this vulnerability was not addressed by (MS03-020) in specific language environments, specifically those that implement double-byte character sets. Yuu Arai of SNS reported that the buffer overflow was still exploitable on Japanese Internet Explorer 6 Service Pack 1, after the update described in (MS03-020) was installed. The issue presents itself when an HTML file which includes a double-byte character string of excessive length as the Type property of an Object Tag, is processed by the vulnerable browser. This vulnerability has been addressed in the (MS03-032)/(822925) Internet Explorer cumulative patch. Affected Microsoft Internet Explorer 5.0.1, 5.0.1 SP1, 5.0.1 SP2, 5.0.1 SP3, 5.5, 5.5 SP1, 5.5 SP2, 6.0, 6.0 SP1 Response The vendor has released a cumulative patch to address this issue
WebAttackMSIEOptionElementUAECVE-2011-1996 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a use after free vulnerability on Microsoft Internet Explorer which may lead to remote code execution. Additional Information Microsoft Internet Explorer is a web browser available for Microsoft Windows platforms. Microsoft Internet Explorer is prone to a remote memory-corruption vulnerability when handling a select element. The issue occurs when the application attempts to access a dereferenced cache memory address. An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks may cause denial-of-service conditions. Affected Microsoft Internet Explorer 8 Microsoft Internet Explorer 7.0
WebAttackMSIEPropertyAttackCVE-2007-0945 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempted attack against Internet Explorer caused by a maliciously crafted website. Additional Information Microsoft Internet Explorer is prone to remote code-execution vulnerability. The problem occurs when viewing a page containing a malformed 'property' method call. An attacker can trigger this issue by tricking an unsuspecting victim into viewing a malicious page. A remote attacker can exploit this issue to execute arbitrary code in the context of the user running the vulnerable application. Affected Microsoft Internet Explorer 6.0, 6.0 SP1, 6.0 SP2, 7.0, 7.0 beta2, 7.0.5730.11 Response Microsoft has released security bulletin MS07-027 with fixes to address this issue. Please see the referenced bulletin for information on obtaining fixes.
WebAttackMSIEReconAttack Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit the Security Bypass Vulnerability attack against Windows Internet Explorer. Additional Information Attackers can exploit this issue to bypass certain security restrictions which may lead to further attacks. Affected Internet Explorer
WebAttackMSIEReconAttack2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit the Security Bypass Vulnerability attack against Windows Internet Explorer. Additional Information Attackers can exploit this issue to bypass certain security restrictions which may lead to further attacks. Affected Internet Explorer
WebAttackMSIERemoteCodeExec Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Stack Overflow vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a browser available for multiple platforms. The browser is prone to a remote denial-of-service vulnerability. Specifically, this issue occurs due to a stack overflow condition when processing a crafted HTML page. To exploit this issue, an attacker must entice an unsuspecting user to visit a malicious site. Successful exploits can allow attackers to crash the affected browser, resulting in denial-of-service conditions. Given the nature of this issue, attackers may also be able to corrupt process memory and execute arbitrary code, but this has not been confirmed. Affected Various Microsoft Internet Explorer versions
Web Attack: MSIE RevealTrans Transition Property BO CVE-2006-3605 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempted attack against Internet Explorer caused by a maliciously crafted website. Additional Information Microsoft Internet Explorer is prone to a denial-of-service vulnerability. This issue is triggered when an attacker convinces a victim user to visit a malicious website. Specifically, the vulnerability presents itself when the browser processes the 'DXImageTransform.Microsoft.RevealTrans' object. An attacker can trigger a NULL-pointer dereference by setting the 'Transition' property of this object to true. A successful attack can cause Microsoft Internet Explorer to crash, effectively denying service to legitimate users. Affected Microsoft Internet Explorer 6.0, 6.0 SP1 Response Upgrade to the latest version of Internet Explorer and ensure that all vendor supplied patches have been applied.
WebAttackMSIESameIDPropertyCVE-2012-1875 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a browser for the Windows operating system. Internet Explorer is prone to a remote code-execution vulnerability. Specifically, the problem occurs when accessing an object that has been deleted. Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Microsoft Internet Explorer 8
WebAttackMSIESameIDPropertyCVE-2012-18752 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a browser for the Windows operating system. Internet Explorer is prone to a remote code-execution vulnerability. Specifically, the problem occurs when accessing an object that has been deleted. Attackers can exploit this issue by enticing an unsuspecting user into opening a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Microsoft Internet Explorer 8
WebAttackMSIEStaticHTMLMethodRCE Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description A vulnerability exists in IE8 in the toStaticHTML API that may result in a potential XSS attack. Additional Information A vulnerability exists in IE8 in the toStaticHTML API that may result in a potential XSS attack. Affected NA Response NA
WebAttackMSIEUseAfterFreeCVE-2012-4792 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, and 8 are affected. Affected Microsoft Internet Explorer versions 6, 7, and 8 are affected.
WebAttackMSIEUseAfterFreeCVE-2012-47922 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, and 8 are affected. Affected Microsoft Internet Explorer versions 6, 7, and 8 are affected.
WebAttackMSIEUseAfterFreeCVE-2012-47923 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, and 8 are affected. Affected Microsoft Internet Explorer versions 6, 7, and 8 are affected.
WebAttackMSIEUseAfterFreeCVE-2012-47924 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, and 8 are affected. Affected Microsoft Internet Explorer versions 6, 7, and 8 are affected.
WebAttackMSIEUseAfterFreeCVE-2012-47925 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, and 8 are affected. Affected Microsoft Internet Explorer versions 6, 7, and 8 are affected.
WebAttackMSIEUseAfterFreeCVE-2012-47926 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, and 8 are affected. Affected Microsoft Internet Explorer versions 6, 7, and 8 are affected.
Web Attack: MSIE Use After Free CVE-2012-4792 7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, and 8 are affected. Affected Microsoft Internet Explorer versions 6, 7, and 8 are affected.
WebAttackMSIEUseAfterFreeCVE-2012-47928 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, and 8 are affected. Affected Microsoft Internet Explorer versions 6, 7, and 8 are affected.
WebAttackMSIEUseAfterFreeCVE-2012-47929 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition when handing the 'CDwnBindInfo' object. Specifically, the issue occurs because the application accesses an object in memory that has not been properly allocated or has been deleted. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer versions 6, 7, and 8 are affected. Affected Microsoft Internet Explorer versions 6, 7, and 8 are affected.
WebAttackMSIEUseAfterFreeCVE-2013-0025 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because it accesses a already freed 'CParaElement' node when a CDoc relayout is performed. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer version 8 is affected. Affected Microsoft Internet Explorer 8
WebAttackMSIEUseAfterFreeCVE-2013-1347 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit the Use-After-Free vulnerability attack against Windows Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already freed. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Microsoft Internet Explorer version 8 is affected. Response Upgrade to the latest version of Internet Explorer.
WebAttackMSIEUseAfterFreeCVE-2013-13472 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit the Use-After-Free vulnerability attack against Windows Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already freed. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Microsoft Internet Explorer version 8 is affected. Response Upgrade to the latest version of Internet Explorer.
Web Attack: MSIE Use After Free CVE-2013-1347 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit the Use-After-Free vulnerability attack against Windows Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already freed. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Microsoft Internet Explorer version 8 is affected. Response Upgrade to the latest version of Internet Explorer.
WebAttackMSIEUseAfterFreeCVE-2013-13474 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit the Use-After-Free vulnerability attack against Windows Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue exists because Internet Explorer accesses an object in memory that was already freed. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Microsoft Internet Explorer version 8 is affected. Response Upgrade to the latest version of Internet Explorer.
WebAttackMSIEUseAfterFreeCVE-2013-38932 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue occurs in the 'CMarkup' component of the 'MSHTML' library. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 10 is affected. Affected Microsoft Internet Explorer 10
WebAttackMSIEUseAfterFreeCVE-2014-0282 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature attempts to exploit a vulnerability in Internet Explorer. Additional Information Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer 6, 7, 8, 9, 10, and 11 are vulnerable. Response Updates are available. Please see the references or vendor advisory for more information.
WebAttackMSIEUseAfterFreeCVE-2014-0322_3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is a Web browser available for Microsoft Windows. Internet Explorer is prone to a remote code-execution vulnerability due to a use-after-free condition. Specifically, this issue occurs in the 'CMarkup' component of the 'MSHTML' library. Attackers can exploit this issue by enticing an unsuspecting user to view a specially crafted webpage. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 10 is affected. Affected Microsoft Internet Explorer 10
WebAttackMSIEUseAfterFreeCVE-2014-1762 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIEUseAfterFreeCVE-2014-1772 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIEUseAfterFreeCVE-2014-1776 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is prone to a remote code execution vulnerability that affects versions from 6-11. Affected Internet Explorer versions 6,7,8,9,10,11
Web Attack: MSIE Use After Free CVE-2014-1776 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Microsoft Internet Explorer. Additional Information Microsoft Internet Explorer is prone to a remote code execution vulnerability that affects versions from 6-11. Affected Internet Explorer versions 6,7,8,9,10,11
WebAttackMSIEUseAfterFreeCVE-2014-1785 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature attempts to exploit a vulnerability in Internet Explorer. Additional Information Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer 6, 7, 8, 9, 10, and 11 are vulnerable. Response Updates are available. Please see the references or vendor advisory for more information.
WebAttackMSIEUseAfterFreeCVE-2014-1791 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackMSIEUseAfterFreeCVE-2014-1815 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature attempts to exploit a vulnerability in Internet Explorer. Additional Information Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions. Affected Internet Explorer 6, 7, 8, 9, 10, and 11 are vulnerable. Response Updates are available. Please see the references or vendor advisory for more information.
WebAttackMSIEXMLDOMActiveXCVE-2013-7331 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Information Disclosure vulnerability in Microsoft XMLDOM ActiveX. Additional Information Microsoft XMLDOM ActiveX control is prone to multiple information-disclosure vulnerabilities. Specifically, these issues affect unspecified methods that will allow website administrator to gain access to sensitive information through error codes. Note: Very limited information is currently available regarding this issue. We will update this BID as more information emerges. Attackers can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow attackers to obtain sensitive information like local drive letters, files, and directory names; that may aid in further attacks. Affected Microsoft Windows 8.1 and earlier
Web Attack: MSIE XMLDOM ActiveX CVE-2013-7331 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Information Disclosure vulnerability in Microsoft XMLDOM ActiveX. Additional Information Microsoft XMLDOM ActiveX control is prone to multiple information-disclosure vulnerabilities. Specifically, these issues affect unspecified methods that will allow website administrator to gain access to sensitive information through error codes. Note: Very limited information is currently available regarding this issue. We will update this BID as more information emerges. Attackers can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow attackers to obtain sensitive information like local drive letters, files, and directory names; that may aid in further attacks. Affected Microsoft Windows 8.1 and earlier
Web Attack: MSIE XMLDOM ActiveX CVE-2013-7331 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a Information Disclosure vulnerability in Microsoft XMLDOM ActiveX. Additional Information Microsoft XMLDOM ActiveX control is prone to multiple information-disclosure vulnerabilities. Specifically, these issues affect unspecified methods that will allow website administrator to gain access to sensitive information through error codes. Note: Very limited information is currently available regarding this issue. We will update this BID as more information emerges. Attackers can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow attackers to obtain sensitive information like local drive letters, files, and directory names; that may aid in further attacks. Affected Microsoft Windows 8.1 and earlier