text
stringlengths
0
383k
WebAttackOSX.MacKeeperDownload3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects OSX.Trojan.Gen activity on the infected machine. Additional Information OSX.Trojan.Gen is a generic detection for many individual but varied OS X Trojans for which specific definitions have not been created. A generic detection is used because it protects against many Trojans that share similar characteristics. Affected MAC OS Response The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines. 1. Update the virus definitions. 2. Run a full system scan.
WebAttackOSXRevirTrojanDownloader Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Trojan OSX.Revir activity on the infected machine. Additional Information OSX.Revir Trojan disguises itself as a PDF when downloaded on the user's machine. When the user executes the file it will drop executables that will download additional malware on the machine. Affected MAC OS Response The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines. 1. Update the virus definitions. 2. Run a full system scan.
WebAttackOTRSHelpDeskCVE20179324 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Security Bypass Vulnerability in OTRS Help Desk which allows to bypass certain security restrictions and perform unauthorized actions. Additional Information OTRS Help Desk is a ticket management application. OTRS Help Desk is prone to a security-bypass vulnerability because it allows remote authenticated users to access and modify arbitrary tickets through unspecified vectors. Specifically, this issue occurs in the 'GenericInterface' in the OTRS Help Desk. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Affected OTRS Help Desk Response Updates are available. Please see the references or vendor advisory for more information.
WebAttackOTRSHelpDeskCVE201793242 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Security Bypass Vulnerability in OTRS Help Desk which allows to bypass certain security restrictions and perform unauthorized actions. Additional Information OTRS Help Desk is a ticket management application. OTRS Help Desk is prone to a security-bypass vulnerability because it allows remote authenticated users to access and modify arbitrary tickets through unspecified vectors. Specifically, this issue occurs in the 'GenericInterface' in the OTRS Help Desk. An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Affected OTRS Help Desk Response Updates are available. Please see the references or vendor advisory for more information.
WebAttackOXIDeShopPre-AuthSQLInjection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit SQL injection vulnerability on the affected machine. Additional Information OXID eShop is vulnerable to SQL Injection attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected OXID eShop up to 6.0.4/6.1.3 Response
WebAttackPack200JARDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This is a silent signature to monitor all Jar downloads(clean and malicious) Additional Information This is a silent signature to monitor all Jar downloads(clean and malicious) Affected Various Windows Platforms
WebAttackPandoraFMSAuthenticatedRemoteCodeExecution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Authentication Remote Code Execution vulnerability on the affected machine. Additional Information Pandora FMS is vulnerable to Authentication Remote Code Execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected Pandora FMS prior to version 7.0NG Response
Web Attack: Papercut NG CVE-2023-27350 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Authentication Bypass vulnerability on the affected machine. Additional Information PaperCut NG is vulnerable to Authentication Bypass attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected PaperCut NG 22.0.5 (Build 63914) Response
Web Attack: PaperCut Path Traversal CVE-2023-39143 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit path traversal vulnerability in PaperCut NG and PaperCut MF. Additional Information PaperCut NG and PaperCut MF before 22.1.3 on Windows allow path traversal, enabling attackers to upload, read, or delete arbitrary files. This leads to remote code execution when external device integration is enabled (a very common configuration). Affected PaperCut NG and PaperCut MF before 22.1.3 on Windows Response
Web Attack: Passwd File Download Attempt Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to access the /etc/passwd file directly through an HTTP request. Additional Information An attempt to access the /etc/passwd file was detected.This file contains the passwords of all users on a Unix system. Affected Any Unix/Linux HTTP Server Response
WebAttackPayloadMagnitudeExploitKit2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attacks from Magnitude Exploit Kit which may compromise a computer through various vendor vulnerabilities. Additional Information Magnitude exploit kit is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. The user is infected by visiting some compromised websites. Exploits may include IE exploit, Adobe flash player exploit. Affected Various windows platforms Response It is highly recommended to do the following action if this exploit kit is in action. Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following:
WebAttackPcVueActiveXControlCVE-2011-40442 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a remote code execution vulnerability in PcVue ActiveX control. Additional Information PcVue is a Multi-station HMI/SCADA controller available for Microsoft Windows. The application is prone to the following issues: 1. A remote code-execution vulnerability affects the 'SaveObject()' and 'LoadObject()' methods of the 'SVUIGrd.ocx' ActiveX control. The ActiveX control is identified by CLSID: 2BBD45A5-28AE-11D1-ACAC-0800170967D9. 2. A memory-corruption vulnerability affects the 'GetExtendedColor()' method of the 'SVUIGrd.ocx' ActiveX control. 3. A memory-corruption vulnerability affects the 'SaveObject()'' and 'LoadObject()' methods of the 'SVUIGrd.ocx' ActiveX control. 4. A buffer-overflow vulnerability affects the 'DeletePage()' method of the 'aipgctl.ocx' ActiveX control. The ActiveX control is identified by CLSID: 083B40D3-CCBA-11D2-AFE0-00C04F7993D6. A remote attacker can exploit these issues by enticing an unsuspecting victim to visit a malicious HTML page. Successfully exploiting these issues allows remote attackers to create or overwrite arbitrary local files and to execute arbitrary code. Failed exploit attempts will result in a denial-of-service condition. Affected PcVue 10.0
WebAttackPDFCoolStudioCVE-2013-4986 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt of leveraging a stack buffer overflow vulnerability in PDFCool Studio which may leads to arbitrary code execution. Additional Information PDFCool Studio is a PDF document handler used to create, edit, sign, compare, split, combine, replace, encrypt and convert PDF documents. The application is prone to a stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data when processing specially crafted PDF files. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause denial-of-service conditions. Affected PDFCool Studio 7.22.1125.2121 is vulnerable; other versions may also be affected.
WebAttackPEDownloadFromSuspiciousDownloader Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt of a file download executed from a suspicious application. Additional Information This signature detects an attempt of a file download executed from a suspicious application.
WebAttackPeercast.orgPeerCastRemoteBufferOverflow Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description PeerCast is prone to a remote buffer overflow vulnerability. This can facilitate a remote compromise due to arbitrary code execution. Additional Information PeerCast is a streaming audio server. It is available for Linux, Microsoft Windows, and Mac OS X platforms. PeerCast is prone to a remote buffer overflow vulnerability. This issue arises because the application fails to perform boundary checks before copying user-supplied data into sensitive process buffers. Specifically, the vulnerability presents itself when the application handles a specially crafted URI containing excessive data. A successful attack can result in memory corruption as finite-sized buffers in the 'procConnectArgs' function of the 'servmgr.cpp' are overflowed due to a call to the 'nextCGIarg' function. This can facilitate a remote compromise due to arbitrary code execution. PeerCast 0.1215 and prior versions are vulnerable. Affected Gentoo Linux peercast.org PeerCast 0.1211, 0.1212, 0.1215 Response The vendor has released version 0.1217 to address this issue. See the referenced advisories for more information and fixes. peercast.org PeerCast 0.1215: peercast.org Upgrade PeerCast v0.1217 peercast.org PeerCast 0.1211: peercast.org Upgrade PeerCast v0.1217 peercast.org PeerCast 0.1212: peercast.org Upgrade PeerCast v0.1217
WebAttackPeercast.orgPeerCastRemoteFormatString Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description PeerCast is affected by a remote format string vulnerability. Additional Information PeerCast is a streaming audio server. It is available for Linux, Microsoft Windows, and Mac OS X platforms. PeerCast is affected by a remote format string vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input data prior to using it in a formatted-printing function. The vulnerability arises when the server attempts to handle a malformed HTTP GET request. An attacker can issue a URI request containing format specifiers resulting the server generating an error message containing the URI and supplying the format specifiers to a formatted-printing function. A successful attack may result in crashing the server or lead to arbitrary code execution. This may facilitate unauthorized access. PeerCast 0.1211 and prior versions are affected by this issue. Affected Gentoo Linux peercast.org PeerCast 0.1211, 0.1212 Response The vendor has released PeerCast 0.1212 to address this issue. Gentoo Linux has released advisory GLSA 200506-15 to address this issue. Users of affected packages are urged to execute the following commands with superuser privileges: emerge --sync emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1212" Please see the referenced advisory for further information.
Web Attack: PE File Download Through IIS Worker Process Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to upload or download or execute malicious payloads onto the server which leads to execution of arbitrary code. Additional Information Payloads uploaded or downloaded to the server can contain OS commands which when parsed incorrectly by the server can lead to execution of remote code. Affected Various platforms. Response
WebAttackPersitsSoftwareXUploadActiveXBO Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a buffer overflow vulnerability in Persits Software XUpload ActiveX control. Additional Information The XUpload ActiveX control allows users to upload files to a server. XUpload is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. This issue affects the 'AddFile()' method of the 'xupload.ocx' control identified by CLSID {E87F6C8E-16C0-11D3-BEF7-009027438003}. If the method is passed excessive data, a buffer overflow may occur because the method fails to verify the length of the user-supplied string before copying it to a finite-sized buffer. An attacker may exploit this issue to execute arbitrary code in the context of an application using the ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions. 'xupload.ocx' 3.0.0.4 of XUpload 3.0 is vulnerable; other versions may also be affected. Affected Persits XUpload 3.0
Web Attack: PfSense PfBlockerNG Shell Upload CVE-2022-31814 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Shell Upload vulnerability in PfSense PfBlockerNG. Additional Information pfSense pfBlockerNG through 2.1.4_26 allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header. Affected pfSense pfBlockerNG through 2.1.4_26 Response
WebAttackPhishingDomainActivity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information This signature is designed to prevent access to sites that redirect users or perform actions to trick users into calling the scammer and installing misleading applications such as fake antivirus software. The creators of misleading applications often use web pages with fake antivirus scanners in order to convince users to download and run an executable file. They may also use intermediate sites that redirect users from the site they are visiting to another one offering misleading applications for download. Misleading applications such as fake antivirus scanners ("http://www.symantec.com/security_response/writeup.jsp?docid=2007-101013-3606-99" Trojan.FakeAV ) or bogus disk defragmenters ("http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-112113-1147-99" UltraDefraggerFraud) are designed to mislead users into thinking that their computer has serious problems that must be fixed by paying for a license of the software. For example, a fake antivirus scanner may perform fake scans of the hard disk and then report multiple non-existent threats. To remove the threats, the misleading application tells the user to purchase a license for the software which may amount to anything from forty to one a hundred dollars plus, depending on whether a "support" package is purchased or not. Of course the software and any support packages offered are bogus and will offer no help whatsoever in cleaning up the problem or protecting against any other threats. Newer generations of misleading applications may also cause instability on the computer such as moving files around, hiding them, or preventing access to certain resources. This is done to coerce the user into buying the fake software. Affected Various operating systems Response No further action is required but you may wish to perform some of the following actions as a precautionary measure.
WebAttackPhoenixToolkitDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackPhoenixToolkitFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackPhoenixToolkitFileDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Additional Information Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Multiple platform Response NA
WebAttackPhoenixToolkitJavaDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to download exploits from a Phoenix toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information This signature will detect attempts to download exploits from a Phoenix toolkit that may compromise a computer through various vendor vulnerabilities. Affected Various
WebAttackPhoenixToolkitPayloadDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackPhoenixToolkitVariantActivity4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Additional Information Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Multiple platform Response NA
WebAttackPhoenixToolkitWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackPhoenixToolkitWebsite2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackPhoenixToolkitWebsite3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Additional Information Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Multiple platform Response NA
WebAttackPhoenixToolkitWebsite4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackPhoenixToolkitWebsite5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Additional Information Phoenix is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Multiple platform Response NA
WebattackPhonebookServer Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a buffer overflow vulnerability in Microsoft Phone Book Service. Additional Information The Phone Book Service is an optional component that ships with the NT 4 Option Pack and Windows 2000. It is not installed by default. A buffer overflow vulnerability was discovered in the URL processing routines of the Phone Book Service requests on IIS 4 and IIS 5. If exploited, this vulnerability allows an attacker to execute arbitrary code and obtain a remote command shell with those privileges of the IUSR_machinename account (IIS 4) or the IWAM_machinename account (IIS 5). Affected Avaya DefinityOne Media Servers Avaya IP600 Media Servers Avaya S3400 Message Application Server Avaya S8100 Media Servers Microsoft Windows 2000 Advanced Server SP1 Microsoft Windows 2000 Server SP1 Microsoft Windows 2000 Workstation Microsoft Windows NT 4.0 Microsoft Windows NT Enterprise Server 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP4, 4.0 SP5, 4.0 SP6, 4.0 SP6a Microsoft Windows NT Server 4.0, 4.0 SP1, 4.0 SP2, 4.0 SP3, 4.0 SP4, 4.0 SP5, 4.0 SP6, 4.0 SP6a Response NOTE: The NT 4.0 fix can be applied to systems running NT 4.0 Service Pack 6a. The Windows 2000 fix can be applied to Windows 2000 Gold or Service Pack 1. This fix will be included in Windows 2000 Service Pack 2.
WebAttackPHP-FusionDatabaseBackupInformationDisclosure Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description PHP-Fusion is a web content management system written in PHP. It uses a MySQL database for site content storage. Additional Information PHP-Fusion is a web content management system written in PHP. It uses a MySQL database for site content storage. It is reported that PHP-Fusion is susceptible to a database backup information disclosure vulnerability. An anonymous remote attacker may be able to download a complete database backup from the server. Authentication would not be required. PHP-Fusion has the capability to make database backups to a file on the web server. These backups are stored in a file with a predictalbe file name, and are not protected by any form of authentication. The backup files are stored in the format: name_YYYY-MM-DD_HHMM with either a ".sql" or a ".sql.gz" extension. The "name" is an arbitrary, site administrator chosen name. An attacker is able to either guess the name, bruteforce the name, or possibly use social engineering tactics to assist in locating the name of the backup files. As these files are located in the web servers document root, by knowing the name of the database backup, an attacker would then just directly request the backup file. No authentication checks are required to succeed in downloading the database dump. A remote attacker may exploit this vulnerability to download the full contents of the application database. The backup includes user information and password hashes. This information could then be used in further attacks against the application. Furthermore, since the database uses the MD5 hash of passwords for authentication, and the authentication cookie directly includes both the username and the MD5 password hash, an attacker would not need to bruteforce the retrieved password hashes. Version 4.00 was reported vulnerable. Other versions are also likely affected. Update: This issue is being retired due to the fact that this is not a vulnerability in the application. Configuring the Web server to restrict access to sensitive files can prevent this problem. Affected PHP-Fusion PHP-Fusion 4.00 Response Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]
WebAttackPHPBazarClassified_right.PHPRemoteFileInclude Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description phpBazar is prone to a remote file-include vulnerability. Additional Information phpBazar is a web-based classified-ad and match-making application implemented in PHP. phpBazar is prone to a remote file-include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input to the 'language_dir' parameter of 'classified_right.php'. An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible. Affected SmartISoft phpBazar 2.1 Response Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
WebAttackPHPBBURLDecodeSQLInjection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This event indicates an attempt to exploit vulnerabilities in phpBB open-source application. Additional Information phpBB is an open-source web forum application that is written in PHP and supported by a number of database products. It will run on most Unix and Linux variants, as well as Microsoft Windows operating systems. The 'viewtopic.php' phpBB script is prone to a remote PHP script injection vulnerability as well as a remote input validation vulnerability due to a failure in the urldecode function reportedly affects phpBB. A remote input validation vulnerability due to a failure in the urldecode function reportedly affects phpBB. This issue is due to a failure to filter critical characters from user-supplied input. This script injection issue is due to a failure to filter critical characters from user-supplied input. This input validation issue is due to a failure of the application to properly sanitize user-supplied URI parameters before using them to construct dynamically generated web pages. The script injection problem presents itself when a malicious user provides specially formatted URL encoded data to the vulnerable script through the 'highlight' parameter. This may allow a remote attacker to execute arbitrary commands in the context of the web server that is hosting the vulnerable software. This issue may also potentially be exploited to trigger SQL injection attacks, this is not confirmed. The input validation problem presents itself as the urldecode function used to filter potentially malicious content from user-supplied input fails to properly translate user-specified input. Specifically all '%2527' strings are translated to '%27', corresponding to the single quote character. Apparently the application fails to properly escape this character once translated, facilitating SQL injection and potentially PHP code execution. **Update: These vulnerabilities are being actively exploited by the Perl.Santy.* worms Affected Gentoo Linux phpBB Group phpBB 1.0.0, 1.2.0, 1.2.1, 1.4.0, 1.4.1, 1.4.2, 1.4.4, 2.0 Beta 1, 2.0 RC1, 2.0 RC2, 2.0 RC3, 2.0 RC4, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, 2.0.6, 2.0.6 c, 2.0.6 d, 2.0.7, 2.0.7 a, 2.0.8 PNphpBB PNphpBB 1.2, 1.2 f, 1.2 g Response Workaround: A temporary workaround is available at the following location: howdark.com exploits - follow up Additionally it is suggested that customers using mod_security may employ the following line to help prevent attacks. The viability of this workaround is not verified by Symantec: SecFilterSelective "THE_REQUEST" "(system|exec|passthru|popen|shell_exec|proc_open|fopen|fwrite)s*(" Solution: Gentoo has released a security advisory (GLSA 200411-32) and an updated eBuild to address this vulnerability. Gentoo users are advised to execute the following sequence of commands as a superuser in order to apply the updates: emerge --sync emerge --ask --oneshot --verbose ">=www-apps/phpbb-2.0.11" The vendor has released an update to address this vulnerability: phpBB Group phpBB 1.0 .0: phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB-2.0.9.zip Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 1.2 .0: phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB-2.0.9.zip Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 1.2.1: phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB-2.0.9.zip Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 1.4 .0: phpBB Group Upgrade phpBB 1.4.1 phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB-2.0.9.zip Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 1.4.1: phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB-2.0.9.zip Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 1.4.2: phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB-2.0.9.zip Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 1.4.4: phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB-2.0.9.zip Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0 Beta 1: phpBB Group Upgrade phpBB-2.0-RC4.tar.gz phpBB Group Upgrade phpBB 2.0.1 phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0 RC1: phpBB Group Upgrade phpBB-2.0-RC4.tar.gz phpBB Group Upgrade phpBB 2.0.1 phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB 2.0.7 phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0 RC2: phpBB Group Upgrade phpBB-2.0-RC4.tar.gz phpBB Group Upgrade phpBB 2.0.1 phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB 2.0.7 phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0 RC3: phpBB Group Upgrade phpBB-2.0-RC4.tar.gz phpBB Group Upgrade phpBB 2.0.1 phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB 2.0.7 phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0 RC4: phpBB Group Upgrade phpBB 2.0.1 phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB 2.0.7 phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0 .0: phpBB Group Upgrade phpBB 2.0.1 phpBB Group Upgrade phpBB 2.0.2 phpBB Group Upgrade phpBB 2.0.3 phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB 2.0.7 phpBB Group Upgrade phpBB-2.0.8.zip phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0.1: phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB 2.0.7 phpBB Group Upgrade phpBB-2.0.8.zip phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0.2: phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB 2.0.7 phpBB Group Upgrade phpBB-2.0.8.zip phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0.3: phpBB Group Upgrade phpBB 2.0.4 phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB 2.0.7 phpBB Group Upgrade phpBB-2.0.8.zip phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0.4: phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB 2.0.7 phpBB Group Upgrade phpBB-2.0.8.zip phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0.5: phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB 2.0.7 phpBB Group Upgrade phpBB-2.0.8.zip phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0.6: phpBB Group Upgrade phpBB-2.0.6.zip phpBB Group Upgrade phpBB 2.0.7 phpBB Group Upgrade phpBB-2.0.8.zip phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0.6 c: phpBB Group Upgrade phpBB 2.0.7 phpBB Group Upgrade phpBB-2.0.8.zip phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0.6 d: phpBB Group Upgrade phpBB 2.0.7 phpBB Group Upgrade phpBB-2.0.8.zip phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0.7: phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0.7 a: phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11 phpBB Group phpBB 2.0.8: phpBB Group Upgrade phpBB-2.0.9.zip phpBB Group Upgrade phpBB-2.0.10 Xore Upgrade CashMod222.zip phpBB Group Upgrade phpBB 2.0.11
WebAttackphpBBViewtopic.PHPSQLInjection Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description phpBB is prone to a SQL injection vulnerability that may be exploited to reveal password hash data; other attacks may also be possible. Additional Information phpBB is an open-source web forum application that is written in PHP and supported by a number of database products. It will run on most Unix and Linux variants, as well as Microsoft Windows operating systems. A SQL injection vulnerability has been reported for phpBB systems that may result in the disclosure of user password hashes; other attacks may also be possible. phpBB, in some cases, does not sufficiently sanitize user-supplied input, which is used when constructing SQL queries to execute on the underlying database. As a result, it is possible to manipulate SQL queries. This may allow a remote attacker to modify query logic or potentially corrupt the database. This vulnerability was reported to exist in the viewtopic.php script file. A remote attacker can exploit this vulnerability by manipulating the $topic_id URI parameter to modify SQL query logic. SQL injection attacks may also potentially be used to exploit latent vulnerabilities in the underlying database implementation. Affected phpBB Group phpBB 2.0.4, 2.0.5 Response Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>. Gentoo Linux has released an advisory. Users who have installed net-www/phpbb are advised to upgrade to phpbb-2.0.5 by issuing the following commands: emerge sync emerge phpbb emerge clean
WebAttackPHPBrobotActivity1 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP Brobot Activity in the system which can lead to compromised networks, file execution and data leakage of confidential information. Additional Information PHP Brobot is a php script that is usually uploaded to compromised webservers to allow more access to systems. When used, the malware author can then view directories, execute files in the system and potentially get confidential information from systems. Affected PHP servers
WebAttackPHPBrobotActivity2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP Brobot Activity in the system which can lead to compromised networks, file execution and data leakage of confidential information. Additional Information PHP Brobot is a php script that is usually uploaded to compromised webservers to allow more access to systems. When used, the malware author can then view directories, execute files in the system and potentially get confidential information from systems. Affected PHP servers
WebAttackPHPBrobotActivity3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP Brobot Activity in the system which can lead to compromised networks, file execution and data leakage of confidential information. Additional Information PHP Brobot is a php script that is usually uploaded to compromised webservers to allow more access to systems. When used, the malware author can then view directories, execute files in the system and potentially get confidential information from systems. Affected PHP servers
WebAttackPHPBrobotActivity4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP Brobot Activity in the system which can lead to compromised networks, file execution and data leakage of confidential information. Additional Information PHP Brobot is a php script that is usually uploaded to compromised webservers to allow more access to systems. When used, the malware author can then view directories, execute files in the system and potentially get confidential information from systems. Affected PHP servers
Web Attack: PHP CGI CVE-2012-1823 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature dectects attempts to exploit a vulnerability in PHP CGI which could result to remote code execution Additional Information PHP is a freely available, open source web scripting language package. It is available for Microsoft Windows, Linux, and Unix operating systems. Direct access to the CGI binary can be prevented by using the configuration option '--enable-force-cgi-redirect' and the php.ini option 'cgi.force_redirect'. A vulnerability exists in PHP when configured as a CGI script that renders these options useless. This is because it fails to properly handle query strings that lack an equals sign character. This allows remote attackers to directly access the CGI binary and to read any file that is readable by the web server user, or to potentially execute arbitrary PHP code. Affected PHP before 5.3.12 and 5.4.x before 5.4.2
Web Attack: PHPCMS2008 Code Injection Vulnerability Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in PHPCMS2008. Additional Information PHPCMS2008 is a content management system which is prone to a code injection vulnerability that can lead to execution of arbitrary code. Affected PHPCMS2008. Response
Web Attack: PhpCollab Unrestricted File Upload CVE-2017-6090 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an unrestricted file upload vulnerability in PhpCollab. Additional Information An unrestricted file upload vulnerability exists in phpCollab that allows remote authenticated users to execute arbitrary code. Affected PhpCollab 2.5.1 and earlier. Response
Web Attack: PHP CVE-2019-11043 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Remote Code Execution vulnerability on the affected products. Additional Information PHP is a programming language commonly used for web applications. PHP is prone to a remote code-execution vulnerability. Specifically, this issue occurs due to underflow error in the 'env_path_info()' funcion of the 'fpm_main.c' source file. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause a denial-of-service condition. Affected PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 Response Updates are available. Please see the references or vendor advisory for more information.
Web Attack: PHPKB Authenticated Remote Code Execution CVE-2020-10386 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Authenticated Remote Code Execution vulnerability on the affected machine. Additional Information PHPKB is vulnerable to Authenticated Remote Code Execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected PHPKB Standard Multi-Language 9 Response
WebAttackPHPKBMulti-LanguageCVE-2020-10389 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit vulnerability on the affected machine. Additional Information MACHINE is vulnerable to EXPLOIT attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected Various Windows machines. Response
WebAttackPHPKMMulti-LanguageCVE-2020-10387 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Authenticated Directory Traversal vulnerability on the affected machine. Additional Information PHPKB Multi-Language is vulnerable to Authenticated Directory Traversal attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected PHPKB Multi-Language 9 Response
WebAttackPHPLDAPAdminWelcome.PHPMultipleVulnerabilities Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description phpldapadmin is prone to multiple input validation vulnerabilities. Additional Information phpldapadmin is a Web based application for administering LDAP servers; it is implemented in PHP. phpldapadmin is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input to the 'custom_welcome_page' of 'welcome.php'. An unauthorized user can exploit this vulnerability to retrieve arbitrary files by supplying directory traversal strings '../' to the vulnerable parameter. Files will be retrieved in the security context of the Web server process. Information obtained may aid in further attacks against the underlying system; other attacks are also possible. phpldapadmin is prone to a remote file include vulnerability. An attacker can exploit this vulnerability to execute arbitrary PHP script code in the security context of the Web server process. phpldapadmin is also prone to a cross-site scripting vulnerability. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks. Affected MandrakeSoft Corporate Server 3.0, 3.0 x86_64 phpldapadmin phpldapadmin 0.9.6, 0.9.7 alpha 5 Response Mandriva Security Advisory MDKSA-2005:212 has been released to address this issue; please see the referenced advisory for further information. Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
WebAttackPHPMoAdminRCECVE-2015-2208 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Invalidated POST parameter 'object' allow attacker run arbitrary code. Additional Information Invalidated POST parameter 'object' allow attacker run arbitrary code. Affected PHP
WebAttackPHPMoAdminRemoteCodeExecutionCVE-2015-2208 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Remote Code Execution Vulnerability on the affected machines. Additional Information PHPMoAdmin is a MongoDB administration tool for PHP. PHPMoAdmin is prone to a remote code-execution vulnerability. Specifically, this issue affects the 'moadmin.php' script. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Affected phpMoAdmin 1.1.2 and prior. Response Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Web Attack: phpMyAdmin Arbitrary File Read Vulnerability CVE-2019-6799 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to arbitrary file read vulnerability in phpMyAdmin. Additional Information An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbitraryServer configuration setting is set to true, with the use of a rogue MySQL server, an attacker can read any file on the server that the web server's user can access. This is related to the mysql.allow_local_infile PHP configuration, and the inadvertent ignoring of "options(MYSQLI_OPT_LOCAL_INFILE" calls. Affected phpMyAdmin before 4.8.5. Response Update to latest available version.
WebAttackphpMyAdminCVE-2009-1151PHPCodeInjection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. Additional Information phpMyAdmin is a PHP-based web application. phpMyAdmin is prone to a vulnerability that lets attackers inject arbitrary PHP code. The issue occurs because the application fails to properly sanitize user-supplied input to the 'setup.php' script. An attacker may exploit this issue to write arbitrary PHP commands to the configuration file generated by the affected script. The attacker's malicious PHP code would run in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible. Affected Versions prior to phpMyAdmin 2.11.9.5 and 3.1.3.1 are vulnerable. Response Vendor updates are available. Please see the references for more information.
WebAttackphpMyAdminCVE-2009-1151PHPCommandExecution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. Additional Information phpMyAdmin is a PHP-based web application. phpMyAdmin is prone to a vulnerability that lets attackers inject arbitrary PHP code. The issue occurs because the application fails to properly sanitize user-supplied input to the 'setup.php' script. An attacker may exploit this issue to write arbitrary PHP commands to the configuration file generated by the affected script. The attacker's malicious PHP code would run in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible. Affected Versions prior to phpMyAdmin 2.11.9.5 and 3.1.3.1 are vulnerable. Response Vendor updates are available. Please see the references for more information.
Web Attack: phpMyAdmin RFI CVE-2018-12613 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote file inclusion vulnerability in phpMyAdmin. Additional Information phpMyAdmin is a PHP-based web application. phpMyAdmin is prone to a remote file inclusion vulnerability. Specifically, this issue occurs because the application fails to properly test whitelisted pages. An attacker can exploit this issue to include files on the server. An attacker can exploit this issue to include arbitrary remote files and execute arbitrary code on the affected application. This may facilitate a compromise of the application and the underlying system; other attacks are also possible. Affected phpMyAdmin 4.8.0 and 4.8.1 are vulnerable.
WebAttackphpMyAdminSQLInjectionCVE-2020-5504 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempts to exploit SQL Injection vulnerability on the affected machines. Additional Information phpMyAdmin is a PHP-based web application. phpMyAdmin is prone to an SQL-injection vulnerability because it fails to properly sanitize user-supplied input before using it in an SQL query. Specifically, this issue affects the 'username' field in 'user accounts' page. Note: To exploit this issue, attacker must have MySQL account to access the server. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Affected phpMyAdmin versions 4.x through and prior to 4.9.4, and 5.x through and prior to 5.0.1 are vulnerable. Response Updates are available. Please see the references or vendor advisory for more information.
WebAttackPHPMyVisitesSet_LangFileInclude Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description phpMyVisites allows unauthorized file includes; this may disclose local files or potentially allow for inclusion of remote files. Additional Information phpMyVisites is a Web site statistics application. phpMyVisites allows attackers to include arbitrary files. While it has been demonstrated that local files may be included through this vulnerability, there is an unconfirmed possibility of remote file inclusion. The source of the vulnerability is that remote attackers may influence the include path of a file through the 'set_lang.php' PHP script. This may be accomplished by submitting an HTTP POST request that sets the 'mylang' variable to a malicious include path. Exploitation could disclose local files, or in the case of remote file inclusion, let the attacker execute malicious PHP code. The issue is known to affect phpMyVisites 1.3. Other versions may also be affected. Affected phpMyVisites phpMyVisites 1.3 Response The vendor has addressed this version in the CVS development version. An official release containing fixes is pending.
Web Attack: PHP Nuke ConfigFile Request Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects attempts to view PHP-Nuke configuration data via file manipulation operation. Additional Information PHP Nuke is a web portal creation and management package, implemented in the PHP scripting language. The default installation includes the script admin/case/case.filemanager.php, which can be used to copy and delete files on the server file system. The script case.filemanager.php is designed such that it can only be called from the script admin.php, which is responsible for authentication of the remote user. This implementation is flawed, due to a bug in PHPs handling of the $PHP_SELF variable. It is possible for a remote user to include information in the url which is appended to the $PHP_SELF variable, allowing him to bypass this check. By calling the script in this manner and passing arbitrary file names to the script, a remote user is able to copy and delete any file on the web server. This is subject to the user permissions the web server is running under. The remote user may, for example, copy '/etc/passwd' over a file normally displayed by the web server, gaining access to sensitive information. If the remote user is able to upload files to the server, they may be able to copy them over a standard PHP Nuke script, and have arbitrary scripts executed by the web user. Affected Francisco Burzi PHP-Nuke 5.2 Response Magnux Software has suggested the following as a solution: To deny file system access to the web server one may use the following commands: # cd php-nuke-document-root # chmod 0 admin/case/case.filemanager.php Francisco Burzi PHP-Nuke 5.2: Francisco Burzi Upgrade PHP-Nuke-5.5.tar.gz
WebAttackPHPObjectInjectionAttempt2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP Object Injection attempts. Additional Information PHP Object Injection vulnerability occurs when user's input is not properly validated before passing it to unserialize PHP function. This can lead to execution of arbitrary code. Affected Various PHP applications. Response
Web Attack: PHP Shell Command Execution 7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP shell uploads and PHP shell commands sent to web servers. Additional Information PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server. Affected Various webservers.
Web Attack: PHP Shell Upload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP shell uploads and PHP shell commands sent to web servers. Additional Information PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server. Affected Various webservers.
WebAttackPHPShellUpload11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP shell uploads and PHP shell commands sent to web servers. Additional Information PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server. Affected Various webservers.
WebAttackPHPShellUpload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP shell uploads and PHP shell commands sent to web servers. Additional Information PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server. Affected Various webservers.
Web Attack: PHP Shell Upload 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP shell uploads and PHP shell commands sent to web servers. Additional Information PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server. Affected Various webservers.
Web Attack: PHP Shell Upload 4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP shell uploads and PHP shell commands sent to web servers. Additional Information PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server. Affected Various webservers.
WebAttackPHPShellUpload5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP shell uploads and PHP shell commands sent to web servers. Additional Information PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server. Affected Various webservers.
Web Attack: PHP Shell Upload 7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP shell uploads and PHP shell commands sent to web servers. Additional Information PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server. Affected Various webservers.
Web Attack: PHP Shell Upload 8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PHP shell uploads and PHP shell commands sent to web servers. Additional Information PHP Shell is a shell created in PHP script. This PHP script is uploaded into remote webservers which are later used as a tool to run arbitrary commands, upload arbitrary files to the compromised server. Affected Various webservers.
Web Attack: PHPStudy Backdoor Request Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempts to access a backdoor in PHPStudy. Additional Information PhpStudy is a program integration package for a PHP debugging environment. It has a backdoor that allows attackers to execute arbitrary commands on the affected webserver. Affected Various PHPStudy versions. Response
Web Attack: PhpThumb Command Injection CVE-2010-1598 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a command injection vulnerability in phpThumb. Additional Information phpThumb() is an application used to create thumbnails from images. The application is prone to a command-injection vulnerability because it fails to adequately sanitize user-supplied input to the 'fltr[]' parameter in the 'phpThumb.php' script. Attackers can exploit this issue to execute arbitrary commands in the context of the webserver. Note that successful exploitation requires 'ImageMagick' to be installed. Affected phpThumb() 1.7.9 is affected; other versions may also be vulnerable.
Web Attack: PHPUnit RCE CVE-2017-9841 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in PHPUnit. Additional Information PHPUnit is prone to an arbitrary code-execution vulnerability. Specifically, this issue affects the 'Util/PHP/eval-stdin.php' source file. Successful exploits may allow attackers to execute arbitrary PHP code using HTTP POST request. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Affected PHPUnit prior to 4.8.28 and 5.x prior to 5.6.3 are vulnerable.
WebAttackPhpWikiPloticusCVE-2014-5519 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts of leveraging a command injection vulnerability in PhpWiki Ploticus module which could lead to system compromise. Additional Information PhpWiki is a WikiWikiWeb clone in PHP. PhpWiki is prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. Specifically, this issue occurs in the Ploticus module. An attacker may exploit this issue to execute arbitrary commands in context of the affected application. Affected PhpWiki 1.5.0
WebAttackPi-holeAuthenticatedRCE Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit vulnerability in Pi-hole to acheive remote code execution. Additional Information Pi-hole is a specialized DNS server that will block ads and malicious domains for devices that use it. This makes it easy to block ads network wide, rather than relying on something like a browser plugin. The Gravity updater in Pi-hole through 4.4 allows an authenticated adversary to upload arbitrary files. This can be abused for Remote Code Execution by writing to a PHP file in the web directory. Also, it can be used in conjunction with the sudo rule for the www-data user to escalate privileges to root. Affected Pi-hole version less than 4.4 Response Update to the latest version of Pi-hole
WebAttackPimcoreCVE-2019-10867 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Code Execution vulnerability on the affected machine. Additional Information Pimcore is vulnerable to Code Execution attack. The vulnerability exists in the "ClassController.php" class, where the "bulk-commit" method makes it possible to exploit the unserialize function when passing untrusted values in "data" parameter. Affected Pimcore prior to version 5.7.1 Response
WebAttackPinterestFakeOffer Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect malicious web pages which are used for facebook likejacking attacks. Additional Information This signature will detect malicious web pages which creates invisible Like buttons at different locations of a webpage where the user can normally click and unknowingly Like a malicious Page. Affected Various browsers. Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following: • Report a potential false positive to Symantec.
Web Attack: Plesk Command Injection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit php-cgi information disclosure vulnerability Additional Information Exploiting this issue allows remote attackers to view the source code of files in the context of the server process. This may allow the attacker to obtain sensitive information and to run arbitrary PHP code on the affected computer; other attacks are also possible. Affected various
WebAttackPluginDetectResearch Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects valid usages of applet tags in HTML. Additional Information This signature detects applet tags in HTML which will be used to gather clean traffic for IPS QA. This signature should not be toggled to blocking as it detects both legit and malicious instances for applet tags. Affected Microsoft .NET Framework 1.0 SP3 Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following: • Report a potential false positive to Symantec.
WebAttackPluginDetectResearch2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects valid usages of applet tags in HTML. Additional Information This signature detects applet tags in HTML which will be used to gather clean traffic for IPS QA. This signature should not be toggled to blocking as it detects both legit and malicious instances for applet tags. Affected Microsoft .NET Framework 1.0 SP3 Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following: • Report a potential false positive to Symantec.
WebAttackPluginDetectResearch3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects valid usages of applet tags in HTML. Additional Information This signature detects applet tags in HTML which will be used to gather clean traffic for IPS QA. This signature should not be toggled to blocking as it detects both legit and malicious instances for applet tags. Affected Microsoft .NET Framework 1.0 SP3 Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following: • Report a potential false positive to Symantec.
WebAttackPOP3GenericUserBO Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a buffer overflow vulnerability in Mail Servers. Additional Information Mail Servers for Windows platforms allows a single Internet connection to be simultaneously shared by multiple computers. A vulnerability in the POP3 proxy portion could allow a remote attacker to crash the server. Many Mail Servers fails to check the length of arguments submitted to the USER command. Affected RevilloC MailServer 1.21 Response Apply all available patches for the applicable POP3 server.
WebAttackPossibleAdobeExploitGeneric Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description An attacker can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Additional Information Adobe Reader and Acrobat are applications for handling PDF files. Adobe Reader and Acrobat are prone to multiple remote code-execution vulnerabilities. Specifically, these issues occurs due to an Out-of-bounds write error. Few technical details are currently available. This BID will be updated as more information emerges. An attacker can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Affected Adobe Reader and Acrobat are applications
WebAttackPossibleExploitGeneric Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackPossibleExploitGeneric2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackPossibleExploitGeneric3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
WebAttackPossibleExploitGeneric4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Additional Information This signatures attempts to exploit known or unknown Internet Explorer bugs using popular evasion techniques. Affected Windows. Response This site which you are viewing could be hosting potentially unsafe content. Avoid browsing to that site if possible and scan your system using a Anti Virus scanner.
Web Attack: Postgres Insecure Trust Authentication Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Insecure TRUST Authentication vulnerability on the affected machine. Additional Information Misconfigured Postgres trust authentication setting could allow attacker to abuse the connection to the server and achieve code execution. Affected Various Postgres versions Response
Web Attack: Powercat Payload Download Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects PowerCat activity. Additional Information PowerCat is a powershell version for the famous netcat tool. It is seen used by various actors during data exfiltration or remote access. Affected Various Windows machines. Response
WebAttackPowerTCPFTPActivexBO Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to exploit a Buffer Overflow Vulnerability in Dart Communications PowerTCP FTP for ActiveX control. Additional Information PowerTCP FTP for ActiveX is an ActiveX control that uses an FTP client. The application is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. The issue affects the 'SecretKey' property of the control identified by CLSID: 39FDA070-61BA-11D2-AD84-00105A17B608 An attacker can exploit this issue to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed attacks will likely cause denial-of-service conditions. The issue affects PowerTCP FTP for ActiveX 2.0.2.0; other versions may also be affected. Affected The issue affects PowerTCP FTP for ActiveX 2.0.2.0; other versions may also be affected. Response Download and install all vendor patches related to this vulnerability.
WebAttackPrestashopCrossSiteRequestForgery Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Cross Site Request Forgery vulnerability on the affected machine. Additional Information PrestaShop is a PHP-based ecommerce application. PrestaShop is prone to cross-site request-forgery vulnerabilities because the application does not properly validate HTTP requests. An attacker can exploit these issues to modify account passwords and mail addresses or to add/remove products from the cart if a logged-in administrative user visits a malicious web site. Exploiting these issues may allow a remote attacker to perform certain unauthorized actions in the context of the affected application. Other attacks are also possible. Affected PrestaShop 1.7.6.4 is vulnerable; other versions may also be affected. Response
Web Attack: PrestaShop Remote Code Execution CVE-2018-8823 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempts to exploit a remote code executoin vulnerability in PrestaShop. Additional Information PrestaShop is prone to a vulnerability that can lead to execution of remote code. Affected PrestaShop 1.5.5.0 through 1.7.2.5. Response
WebAttackProPackExploitKitDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackPUAFirefoxExtensionActivity2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information This signature is designed to prevent access to sites that redirect users or perform actions to trick users into calling the scammer and installing misleading applications such as fake antivirus software. The creators of misleading applications often use web pages with fake antivirus scanners in order to convince users to download and run an executable file. They may also use intermediate sites that redirect users from the site they are visiting to another one offering misleading applications for download. Misleading applications such as fake antivirus scanners ("http://www.symantec.com/security_response/writeup.jsp?docid=2007-101013-3606-99" Trojan.FakeAV ) or bogus disk defragmenters ("http://www.symantec.com/business/security_response/writeup.jsp?docid=2010-112113-1147-99" UltraDefraggerFraud) are designed to mislead users into thinking that their computer has serious problems that must be fixed by paying for a license of the software. For example, a fake antivirus scanner may perform fake scans of the hard disk and then report multiple non-existent threats. To remove the threats, the misleading application tells the user to purchase a license for the software which may amount to anything from forty to one a hundred dollars plus, depending on whether a "support" package is purchased or not. Of course the software and any support packages offered are bogus and will offer no help whatsoever in cleaning up the problem or protecting against any other threats. Newer generations of misleading applications may also cause instability on the computer such as moving files around, hiding them, or preventing access to certain resources. This is done to coerce the user into buying the fake software. Affected Various operating systems Response No further action is required but you may wish to perform some of the following actions as a precautionary measure.
WebAttackPUAOpencandyDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Adware.Gen communicating and requesting information from its controlling server. Additional Information Adware and PUAs are known to download and execute Malicious applications which can harm the system and can steal data. Affected Various Windows Platforms.
WebAttackPulseConnectSecureDirectoryTraversalVulnerability Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Pulse Connect Secure. Additional Information Pulse Connect Secure is prone to a vulnerability that can lead to remote code execution. Affected Pulse Connect Secure. Response
Web Attack: Pulse Secure SSL VPN File Disclosure CVE-2019-11510 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit vulnerability on the affected machine. Additional Information Pulse Secure SSL VPN that enables extranet users to connect to corporate network securely. Pulse Secure SSL VPN is prone to a file disclosure vulnerability that can further lead to device compromise. Affected Version: 8.1R15.1, 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4. Response
WebAttackPulseSecureSuspiciousRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects suspicious requests to Pulse Secure server. Additional Information Pulse Secure is prone to a vulnerability that allows unauthenticated users to gain access to sensitive files. Affected Pulse Secure Server. Response
WebAttackPulseSecureVPNCVE-2019-11539 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Arbitrary Command Execution vulnerability on the affected machine. Additional Information Pulse Secure SSL VPN is vulnerable to Arbitrary Command Execution attack. The admin web interface allows an authenticated attacker to inject and execute commands as root. Affected Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1 Pulse Policy Secure version 9.0RX before 9.0R3.2, 5.4RX before 5.4R7.1, 5.3RX before 5.3R12.1, 5.2RX before 5.2R12.1, and 5.1RX before 5.1R15.1 Response
WebAttackPUP.SearchProtectDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to download Potentially Unwanted Program - SearchProtect. Additional Information PUA.SearchProtect is a potentially unwanted app that modifies settings on the Web browser. The program arrives on the computer through a third-party installer or download manager. It has the ability to install itself silently. The program may connect to the following remote locations while it's installing itself: sp-installer.conduit-data.com sp-storage.conduit-services.com sp-installer.databssint.com sp-download.spccint.com sp-storage.spccinta.com sp-settings.spccint.com sp-installer.databssint.com servicemap.spccint.com sp-ip2location.spccint.com sp-alive-msg.databssint.com sp-autoupdate.spccint.com c.api.seccint.com sp-usage.databssint.com Once the program is installed, it changes the Web browser's default home page, new tab settings and search engine to the following remote locations: search.conduit.com www.trovi.com The program prevents other software from changing the Web browser's default home page, new tab and search engine. It allows users to change these settings through the program itself. Affected Various Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following:
WebAttackPUPAdwareFakeApplicationDownload Severity:Low This attack poses a minor threat. Corrective action may not be possible or is not required. Description This signature detects a file installer download which are associated with adware. Additional Information Adware are programs that secretly gather personal information through the Internet and relay it back to another computer. This is done by tracking browsing habits, generally for advertising purposes. Adware is a type of program that displays an advertisement of some sort. Adware is usually related to a specific Web site that is cached in the Web browser. In some cases, it changes the home page of your Web browser to point to a specific Web site. Because adware is not malicious in nature, it is not considered a virus. Affected Various Windows Platforms Response Unless otherwise known, any unintended PUA/Adware Activity in this network traffic should be treated as Malicious. Actions should be taken to suspend and audit the communication and potentially block this network Activity from further communication. If you want to block this network traffic, refer the following link: https://support.symantec.com/en_US/article.HOWTO80883.html
WebAttackPUPAdwareFakeApplicationDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackPUPAdwareFakeApplicationDownload4 Severity:Low This attack poses a minor threat. Corrective action may not be possible or is not required. Description This signature detects a file installer download which are associated with adware. Additional Information Adware are programs that secretly gather personal information through the Internet and relay it back to another computer. This is done by tracking browsing habits, generally for advertising purposes. Adware is a type of program that displays an advertisement of some sort. Adware is usually related to a specific Web site that is cached in the Web browser. In some cases, it changes the home page of your Web browser to point to a specific Web site. Because adware is not malicious in nature, it is not considered a virus. Affected Various Windows Platforms Response Unless otherwise known, any unintended PUA/Adware Activity in this network traffic should be treated as Malicious. Actions should be taken to suspend and audit the communication and potentially block this network Activity from further communication. If you want to block this network traffic, refer the following link: https://support.symantec.com/en_US/article.HOWTO80883.html