text
stringlengths
0
383k
WebAttackPUPAdwareFakeApplicationDownload5 Severity:Low This attack poses a minor threat. Corrective action may not be possible or is not required. Description This signature detects a file installer download which are associated with adware. Additional Information Adware are programs that secretly gather personal information through the Internet and relay it back to another computer. This is done by tracking browsing habits, generally for advertising purposes. Adware is a type of program that displays an advertisement of some sort. Adware is usually related to a specific Web site that is cached in the Web browser. In some cases, it changes the home page of your Web browser to point to a specific Web site. Because adware is not malicious in nature, it is not considered a virus. Affected Various Windows Platforms Response Unless otherwise known, any unintended PUA/Adware Activity in this network traffic should be treated as Malicious. Actions should be taken to suspend and audit the communication and potentially block this network Activity from further communication. If you want to block this network traffic, refer the following link: https://support.symantec.com/en_US/article.HOWTO80883.html
Web Attack: PurpleFox Exploit Kit Website Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
Web Attack: PurpleFox Exploit Kit Website 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackPWDumpXRemoteAccessActivity1 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
WebAttackqdPMAuthenticatedRemoteCodeExecutionCVE-2020-7246 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Authenticated Remote Code Execution vulnerability on the affected machine. Additional Information qdPM is vulnerable to Authenticated Remote Code Execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected qdPM prior to version 9.1 Response
Web Attack: Qlik Sense Enterprise Path Traversal CVE-2023-41266 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit path traversal vulnerability in Qlik Sense Enterprise for Windows. Additional Information A path traversal vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows an unauthenticated remote attacker to generate an anonymous session. This allows them to transmit HTTP requests to unauthorized endpoints. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13. Affected Qlik Sense Enterprise for Windows: August 2022 Patch 12 - November 2022 Patch 10 Response
WebAttackQNAPNASArbitraryFileUploadCVE-2018-19945 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit vulnerabilities in QNAP NAS devices. Additional Information QNAP NAS is prone to multiple vulnerabilities that can lead to compromise of the device. Affected QNAP NAS devices. Response
Web Attack: QNAP NAS Remote Code Execution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in QNAP NAS. Additional Information QNAP NAS is prone to a vulnerability that can lead to execution of arbitrary code. Affected QNAP NAS. Response
Web Attack: QNAP Network Attached Storage CVE-2021-28799 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Improper Authorization on the affected machine. Additional Information QNAP Network Attached Storage (NAS) is vulnerable to Improper Authorizationon attack. Successfully exploiting these issues will allow remote attackers to log in to a device. Affected QNAP Systems Inc. HBS 3 versions prior to v16.0.0415 on QTS 4.5.2; versions prior to v3.0.210412 on QTS 4.3.6; versions prior to v3.0.210411 on QTS 4.3.4; versions prior to v3.0.210411 on QTS 4.3.3; versions prior to v16.0.0419 on QuTS hero h4.5.1; versions prior to v16.0.0419 on QuTScloud c4.5.1~c4.5.4. Response
Web Attack: QNAP QTS Remote Code Execution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in QNAP NAS. Additional Information QNAP NAS is prone to a vulnerability that can lead to execution of arbitrary code. Affected QNAP NAS. Response
WebAttackQuestIntrustRCECVE-2012-5896 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a remote code execution vulnerability in Quest Intrust. Additional Information Quest InTrust is an event log management software for security and compliance. Quest InTrust is prone to a remote code-execution vulnerability due to an error in handling an uninitialized pointer. Specifically, the issue affects the 'AnnotateX.dll' component. An attacker can exploit this issue by invoking 'Add()' method. Affected Quest InTrust 10.4.X and earlier is vulnerable
WebAttackQuestIntrustRCECVE-2012-58962 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a remote code execution vulnerability in Quest Intrust. Additional Information Quest InTrust is an event log management software for security and compliance. Quest InTrust is prone to a remote code-execution vulnerability due to an error in handling an uninitialized pointer. Specifically, the issue affects the 'AnnotateX.dll' component. An attacker can exploit this issue by invoking 'Add()' method. Affected Quest InTrust 10.4.X and earlier is vulnerable
WebAttackQuickBoxProCVE-2020-13448 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Authenticated Remote Code Execution vulnerability on the affected machine. Additional Information QuickBox Pro is vulnerable to Authenticated Remote Code Execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected QuickBox Pro prior to version 2.1.8 Response
WebAttackQuicktimeRTSPURIBO Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a vulnerability in Apple QuickTime that allows an attacker to execute arbitrary code. Additional Information Apple QuickTime is prone to a remote buffer-overflow vulnerability. This issue is due to a failure of the application to properly bounds-check user-supplied input prior to copying it to an insufficiently sized stack-based memory buffer. Specifically, URIs with the 'RTSP' scheme containing specifically formatted excessive data will result in a memory buffer being overrun with attacker-supplied data.n n This issue allows remote attackers to execute arbitrary machine code in the context of the affected application, facilitating the remote compromise of affected computers. Attackers exploit this issue by coercing targeted users to access malicious HTML or QTL files, or by executing malicious JavaScript code. Any of these methods allow attackers to launch an excessively long RTSP URI, triggering the issue. QuickTime version 7.1.3 is vulnerable to this issue; other versions may also be affected. Affected Apple QuickTime Player 7.1.3 Response Update to the latest version of Quicktime and ensure that all patches are applied.
Web Attack: Ransom.Cerber Download Request 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Ransomware network encryption activity. Additional Information Ransomware encrypts targeted files stored on local and mounted network drives of the compromised machine. Encrypted files are usually appended with suspicious extension such as .locked, .encrypted, .RYK, etc. Once it completes the encryption activity, it then issues a ransom demand in order to restore the encrypted files. Affected Various platforms
WebAttackRansom.CryptodefenseDownloadRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Ransom malware activity on the infected machine. Additional Information Ransom malware infects the machines and locks down access to the machine. In order to restore access to the machine it demands a ransom from the user. Affected Various platforms
WebAttackRansom.EncipheredActivity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Ransomware network encryption activity. Additional Information Ransomware encrypts targeted files stored on local and mounted network drives of the compromised machine. Encrypted files are usually appended with suspicious extension such as .locked, .encrypted, .RYK, etc. Once it completes the encryption activity, it then issues a ransom demand in order to restore the encrypted files. Affected Various platforms
WebAttackRansom.GenDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Ransom malware activity on the infected machine. Additional Information Ransom malware infects the machines and locks down access to the machine. In order to restore access to the machine it demands a ransom from the user. Affected Various platforms
WebAttackRansom.GenDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Ransomware network encryption activity. Additional Information Ransomware encrypts targeted files stored on local and mounted network drives of the compromised machine. Encrypted files are usually appended with suspicious extension such as .locked, .encrypted, .RYK, etc. Once it completes the encryption activity, it then issues a ransom demand in order to restore the encrypted files. Affected Various platforms
WebAttackRansom.GenDownload3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Ransom malware activity on the infected machine. Additional Information Ransom malware infects the machines and locks down access to the machine. In order to restore access to the machine it demands a ransom from the user. Affected Various platforms
WebAttackRansomlockWebsite10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects websites that display fake warnings and locks the browser demanding ransom money. Additional Information Malicious websites displays fake warnings and locks the browser demanding ransom money. Affected Various platforms.
WebAttackRansomlockWebsite3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects websites that display fake warnings and locks the browser demanding ransom money. Additional Information Malicious websites displays fake warnings and locks the browser demanding ransom money. Affected Various platforms.
WebAttackRansomlockWebsite4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects websites that display fake warnings and locks the browser demanding ransom money. Additional Information Malicious websites displays fake warnings and locks the browser demanding ransom money. Affected Various platforms.
WebAttackRansomlockWebsite5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects websites that display fake warnings and locks the browser demanding ransom money. Additional Information Malicious websites displays fake warnings and locks the browser demanding ransom money. Affected Various platforms.
WebAttackRansomlockWebsite6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects websites that display fake warnings and locks the browser demanding ransom money. Additional Information Malicious websites displays fake warnings and locks the browser demanding ransom money. Affected Various platforms.
WebAttackRansomlockWebsite7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects websites that display fake warnings and locks the browser demanding ransom money. Additional Information Malicious websites displays fake warnings and locks the browser demanding ransom money. Affected Various platforms.
WebAttackRansomlockWebsite8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Ransom malware activity on the infected machine. Additional Information Ransom malware infects the machines and locks down access to the machine. In order to restore access to the machine it demands a ransom from the user. Affected Various platforms
WebAttackrConfigAuthenticatedRemoteCodeExecutionCVE-2019-19509 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Authenticated Remote Code Execution vulnerability on the affected machine. Additional Information rConfig is vulnerable to Authenticated Remote Code Execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected rConfig 3.9.3 Response
Web Attack: rConfig Authenticated Remote Code Execution CVE-2020-10221 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Authenticated Remote Code Execution vulnerability on the affected machine. Additional Information rConfig is vulnerable to Authenticated Remote Code Execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected rConfig 3.93 Response
Web Attack: rConfig Command Execution CVE-2019-16662 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in rConfig. Additional Information rConfig is prone to multiple command-execution vulnerabilities. 1. A command-execution vulnerability. Specifically, this issue occurs because it fails to filter the 'catCommand' parameter passed to the 'exec()' function of the 'search.crud.php' file. An attacker can exploit this issue by sending a GET request to execute system commands. [CVE-2019-16663] 2. A command-execution vulnerability. Specifically, this issue occurs because it fails to filter the 'rootUname' parameter passed to the 'exec()' function of the 'ajaxServerSettingsChk.php' file. An attacker can exploit this issue by sending a GET request to execute system commands. [CVE-2019-16662] An can exploit these issues to execute arbitrary commands within the context of the affected application. Affected rConfig version 3.9.2 is vulnerable; other versions may also be affected.
WebAttackrConfigRemoteCommandInjectionCVE-2020-10879 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit vulnerability on the affected machine. Additional Information MACHINE is vulnerable to EXPLOIT attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected Various Windows machines. Response
WebAttackRealNetworksGameHouseActiveX Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploits a remote command execution vulnerability in RealNetworks GameHouse. Additional Information GameHouse allows users to download games or to play games online. 'InstallerDlg.dll' is an ActiveX control for Internet Explorer used for playing games online. The GameHouse 'InstallerDlg.dll' ActiveX control is prone to the following issues: 1. Multiple remote command-execution vulnerabilities that affect the following methods identified by the CLSID: {5818813E-D53D-47A5-ABBB-37E2A07056B5} 'CreateVistaTaskLow()' 'Exec()' 'ExecLow()' 'ShellExec()' 2. Multiple remote command-execution vulnerabilities that affect the following methods identified by the CLSID: {80AB3FB6-9660-416C-BE8D-0E2E8AC3138B} 'ShellExec()' 'ShellExecRunAs()' 3. Multiple remote-code execution vulnerabilities that affect following methods identified by the CLSID: {80AB3FB6-9660-416C-BE8D-0E2E8AC3138B} 'CreateShortcut()' 'CopyDocument()' A remote attacker can exploit these issues by enticing an unsuspecting victim to visit a malicious HTML page. Successfully exploiting these issues allows the attacker to execute arbitrary commands within the context of the application (typically, Internet Explorer) that uses the ActiveX control, and allows remote attackers to create or overwrite arbitrary local files and to execute arbitrary code. Failed exploit attempts will result in a denial-of-service condition. InstallerDlg.dll 2.6.0.445 is vulnerable; other versions may also be affected. Affected InstallerDlg.dll 2.6.0.445 Response N/A
WebAttackRealPlayer.rmpBufferOverflow Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a buffer overflow vulnerability in RealPlayer by crafting a malicious .rmp file. Additional Information RealPlayer is an application that allows users to play back various media formats. RealPlayer is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Specifically, this issue occurs while handling specially crafted '.rmp' files. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. RealPlayer 11.0 is vulnerable; other versions may also be affected. Affected RealPlayer 11.0 is vulnerable; other versions may also be affected. Response Currently, we are not aware of any vendor-supplied patches.
WebAttackRealPlayerActiveXCDDA Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in RealPlayer. Additional Information Real Networks RealPlayer SP and RealPlayer Enterprise are media players available for multiple platforms. RealPlayer SP and Enterprise are prone to a remote code-execution vulnerability. The issue occurs due to an error in handling an uninitialized pointer when parsing a specially crafted CDDA URI. A remote attacker may exploit this issue by enticing victims into opening a malicious HTML document. Exploiting this issue allows the attacker to execute arbitrary code in the context of applications using the affected ActiveX control. Failed attempts will likely result in denial-of-service conditions. NOTE: This issue was previously discussed in BID 44144 (Real Networks RealPlayer SP and RealPlayer Enterprise Multiple Security Vulnerabilities) but has been given its own records to better document it. Affected Real Networks RealPlayer SP 1.1.4 Real Networks RealPlayer SP 1.0.2 Real Networks RealPlayer SP 1.0.1 Real Networks RealPlayer SP 1.0 Real Networks RealPlayer SP 1.1.3 Real Networks RealPlayer SP 1.1.2 Real Networks RealPlayer SP 1.1.1 Real Networks RealPlayer SP 1.1 Real Networks RealPlayer Enterprise 2.1.2 Real Networks RealPlayer 11.0.5 Real Networks RealPlayer 11.0.2 Real Networks RealPlayer 11.0.1 Real Networks RealPlayer 11.1 Real Networks RealPlayer 11 Response The vendor released an update to address this issue.
WebAttackRealPlayerActiveXCDDA2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in RealPlayer. Additional Information Real Networks RealPlayer SP and RealPlayer Enterprise are media players available for multiple platforms. RealPlayer SP and Enterprise are prone to a remote code-execution vulnerability. The issue occurs due to an error in handling an uninitialized pointer when parsing a specially crafted CDDA URI. A remote attacker may exploit this issue by enticing victims into opening a malicious HTML document. Exploiting this issue allows the attacker to execute arbitrary code in the context of applications using the affected ActiveX control. Failed attempts will likely result in denial-of-service conditions. NOTE: This issue was previously discussed in BID 44144 (Real Networks RealPlayer SP and RealPlayer Enterprise Multiple Security Vulnerabilities) but has been given its own records to better document it. Affected Real Networks RealPlayer SP 1.1.4 Real Networks RealPlayer SP 1.0.2 Real Networks RealPlayer SP 1.0.1 Real Networks RealPlayer SP 1.0 Real Networks RealPlayer SP 1.1.3 Real Networks RealPlayer SP 1.1.2 Real Networks RealPlayer SP 1.1.1 Real Networks RealPlayer SP 1.1 Real Networks RealPlayer Enterprise 2.1.2 Real Networks RealPlayer 11.0.5 Real Networks RealPlayer 11.0.2 Real Networks RealPlayer 11.0.1 Real Networks RealPlayer 11.1 Real Networks RealPlayer 11 Response The vendor released an update to address this issue.
WebAttackRealPlayerCVE-2008-1309 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a memory corruption vulnerability in RealPlayer which could result in remote code execution. Additional Information RealNetworks RealPlayer is an application that allows users to play various media formats. RealPlayer 'rmoc3260.dll' ActiveX control is prone to a memory-corruption vulnerability. This ActiveX control is associated with the following CLSIDs: 3B5E0503-DE28-4BE8-919C-76E0E894A3C2 2F542A2E-EDC9-4BF7-8CB1-87C9919F7F93 A1A41E11-91DB-4461-95CD-0C02327FD934 CFCDAA03-8BE4-11CF-B84B-0020AFBBCCFA 0FDF6D6B-D672-463B-846E-C6FF49109662 3B46067C-FD87-49B6-8DDD-12F0D687035F 224E833B-2CC6-42D9-AE39-90B6A38A4FA2 44CCBCEB-BA7E-4C99-A078-9F683832D493 This issue affects the 'Console()' method; other methods may also be vulnerable. An attacker can exploit this issue by enticing an unsuspecting user to view a malicious HTML page. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the affected ActiveX control. Failed exploit attempts will likely crash the application. Affected RealPlayer 11 is vulnerable; other versions may also be affected. Response The vendor addressed this issue in RealPlayer 11.0.2. Please contact the vendor for details.
WebAttackRealPlayerIERPCtlActiveXCVE-2007-5601 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to exploit a buffer overflow vulnerability by passing special arguments into a method exported by RealPlayer's plugin. Additional Information Real Networks RealPlayer is an application that allows users to play various media formats. RealPlayer is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks of user-supplied input before copying it to an insufficiently sized memory buffer. Currently there is very little information available regarding this issue. The issue is being investigated and this BID will be updated as details emerge. Attackers can exploit this issue to execute arbitrary code in the context of the application using the affected control (typically Internet Explorer). Successful attacks can compromise the application and possibly the underlying computer. Failed attacks will likely cause denial-of-service conditions. Affected Real Networks RealPlayer 10.0 Response Download and install all vendor patches related to this vulnerability.
WebAttackRealPlayerRecordClipParamInjection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to perform parameter injection trick in RecordClip function. Additional Information Real Networks RealPlayer SP is a media player available for multiple platforms. The application is prone to a remote code-execution vulnerability that occurs when injecting specific characters into the arguments of the 'RecordClip' method. Specifically, an attacker can use the '/t' and '/f' switches to download a crafted '.mp3' file to an arbitrary location on the system and execute batch commands. An attacker may exploit the issue via the RealPayer ActiveX control identified by CLSID: FDC7A535-4070-4B92-A0EA-D9994BCC0DC5 An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage. Successful exploits will allow the attacker to execute arbitrary code within the context of the application (typically Internet Explorer) that uses the ActiveX control. Versions prior to and including RealPlayer SP 1.1 for Windows are vulnerable. NOTE: This issue was previously discussed in BID 44144 (Real Networks RealPlayer SP and RealPlayer Enterprise Multiple Security Vulnerabilities) but has been given its own record to better document it. Affected RealPlayer SP 1.1 Response Updates are available. Please see the references for details.
WebAttackRealPlayerRMPFile Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a buffer overflow vulnerability in RealPlayer by crafting a malicious .rmp file. Additional Information RealPlayer is an application that allows users to play back various media formats. RealPlayer is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Specifically, this issue occurs while handling specially crafted '.rmp' files. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. RealPlayer 11.0 is vulnerable; other versions may also be affected. Affected RealPlayer 11.0 is vulnerable; other versions may also be affected. Response Currently, we are not aware of any vendor-supplied patches.
WebAttackRealPlayerRMPFileProcessingCVE-2013-6877 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt of levergaing a 'RMP' file processing heap buffer overflow in RealPlayer which may leads to arbitrary code execution. Additional Information RealPlayer is an application that allows users to play back various media formats. RealPlayer is prone to a remote heap-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Specifically, this issue occurs while handling specially crafted 'RMP' files. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Affected RealPlayer 16.0.2.32 and 16.0.3.51 are vulnerable; other versions may also be affected.
Web Attack: Realtek Jungle SDK RCE CVE-2021-35394 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit vulnerabilities in Realtek Jungle SDK based routers. Additional Information On some Realtek Jungle SDK based routers, potential memory corruption vulnerabilities in some services may cause their denial of the service. CVE-2021-35392/CVE-2021-35393 The 'WiFi Simple Config' server (wscd) that implements both UPnP and SSDP protocols is vulnerable to a stack buffer overflow (CVE-2021-35393) due to unsafe parsing of the UPnP SUBSCRIBE/UNSUBSCRIBE Callback header, and also a heap buffer overflow (CVE-2021-35392) due to unsafe crafting of SSDP NOTIFY messages from received M-SEARCH message's ST header. CVE-2021-35394 The 'UDPServer' MP tool is affected by multiple buffer overflow vulnerabilities and an arbitrary command injection vulnerability, due to insufficient legality detection on commands received from clients. CVE-2021-35395 The HTTP web server 'boa' (go-ahead has been obsoleted) is vulnerable to multiple buffer overflows due to unsafe copies of some overly long parameters submitted in the form, such as - unsafe copy of 'submit-url' parameter in formRebootCheck/formWsc/formWlanMultipleAP - unsafe copy of 'ifname' parameter in formWlSiteSurvey - unsafe copy of 'hostname' parameter in formStaticDHCP - unsafe copy of 'peerPin' parameter in formWsc Affected rtl819x-SDK-v3.2.x Series, rtl819x-SDK-v3.4.x Series, rtl819x-SDK-v3.4T Series, rtl819x-SDK-v3.4T-CT Series, Xrtl819x-eCos-v1.5.x Series Response
WebAttackRealtekJungleSDKRCECVE-2021-35395 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit vulnerabilities in Realtek Jungle SDK based routers. Additional Information On some Realtek Jungle SDK based routers, potential memory corruption vulnerabilities in some services may cause their denial of the service. CVE-2021-35392/CVE-2021-35393 The 'WiFi Simple Config' server (wscd) that implements both UPnP and SSDP protocols is vulnerable to a stack buffer overflow (CVE-2021-35393) due to unsafe parsing of the UPnP SUBSCRIBE/UNSUBSCRIBE Callback header, and also a heap buffer overflow (CVE-2021-35392) due to unsafe crafting of SSDP NOTIFY messages from received M-SEARCH message's ST header. CVE-2021-35394 The 'UDPServer' MP tool is affected by multiple buffer overflow vulnerabilities and an arbitrary command injection vulnerability, due to insufficient legality detection on commands received from clients. CVE-2021-35395 The HTTP web server 'boa' (go-ahead has been obsoleted) is vulnerable to multiple buffer overflows due to unsafe copies of some overly long parameters submitted in the form, such as - unsafe copy of 'submit-url' parameter in formRebootCheck/formWsc/formWlanMultipleAP - unsafe copy of 'ifname' parameter in formWlSiteSurvey - unsafe copy of 'hostname' parameter in formStaticDHCP - unsafe copy of 'peerPin' parameter in formWsc Affected rtl819x-SDK-v3.2.x Series, rtl819x-SDK-v3.4.x Series, rtl819x-SDK-v3.4T Series, rtl819x-SDK-v3.4T-CT Series, Xrtl819x-eCos-v1.5.x Series Response
Web Attack: Realtek SDK RCE CVE-2014-8361 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Realtek rtl81xx SDK. Additional Information Realtek rtl81xx SDK is prone to a remote code execution vulnerability because it fails to properly sanitize user supplied data when handling the NewInternalClient requests. Specifically, this issue affects the 'miniigd' SOAP service. An attacker can exploit this issue to execute arbitrary code with root privileges. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. Affected Realtek rtl81xx SDK
WebAttackRedDotExploitKitDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackRedDotExploitKitDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackRedDotExploitKitDownload3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackRedExploitKitPDFDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackRedExploitKitRedirect Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackRedExploitKitRedirect3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Red kit that may compromise a computer through various vendor vulnerabilities Additional Information Redkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Web Browsers Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following:
WebAttackRedExploitKitWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackRedExploitKitWebsite3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackRedExploitKitWebsite4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
Web Attack: Red Exploit Kit Website 5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackRedHatDirectoryServerAcceptLanguageBufferOverflow Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description : Red Hat Directory Server is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Attackers could exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely cause denial-of-service conditions. Additional Information Red Hat Directory Server is a centralization server based on the Lightweight Directory Access Protocol (LDAP). The server is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The problem occurs in the Accept Language HTTP header parser in the 'adminutil' library used in the Administration Server's CGI scripts. A remote attacker who can connect to the administration server web interface may be able to exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely cause denial-of-service conditions. NOTE: The Administration Server of Directory Server usually runs with superuser privileges. The following are affected: - Red Hat Directory Server 7.1 - Versions prior to 'adminutil' 1.1.7 Affected Red Hat Directory Server 7.1 Response The vendor has released an advisory and Service Pack 7. Please see the references for more information.
WebAttackRedHatPXEServerRemoteBO Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects an attempt to overflow the Red Hat Linux PXE server. Additional Information A vulnerability has been discovered in PXE which is included with Red Hat Linux. It is possible for a remote attacker to overrun a buffer by passing excessive data to the service. This may result in the corruption of sensitive process memory, and may allow an attacker to execute arbitrary commands. Affected RedHat PXE Server 2.0 Beta 1 Response Block external access at the network boundary, unless service is required by external parties. - Attempts to exploit this vulnerability may be limited by filtering traffic destined to the PXE service. Run all server processes as non-privileged users with minimal access rights. Run all server processes as non-priviledged users with minimal access rights. - If permitted, run the PXE server with the leaset privileges required to function. This may limit the consequences of an attackergaining the ability to execute arbitrary code. Disable any unnecessary default services. - Unless explicitly required, disable the use of the PXE server on affected systems. Implement multiple redundant layers of security. - The exploitation of this and other memory corruption vulnerabilities may be hindered through the use of various memory protection schemes. Where permissible, implement the use of non-executable and randomly mapped memory pages. Upgrade to the latest version of PXE Server.
Web Attack: Redis CVE-2022-0543 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Lua Sandbox Escape vulnerability on the affected machine. Additional Information Redis is vulnerable to Lua Sandbox Escape attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected Various Operating Systems. Response
WebAttackRedkitExploitKitTemplate Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackRedkitExploitWebsite2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Redkit toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Redkit Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Web Browsers
Web Attack: Rejetto HttpFileServer CVE-2014-6287 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts of leveraging a vulnerability in HTTP File Server which could lead to remote command-execution. Additional Information HTTP File Server is designed for file transfer. HTTP File Server is prone to a remote command-execution vulnerability because it fails to properly handle null-byte. Specifically, this issue occurs in the 'ParserLib.pas' file. An attacker can execute arbitrary commands with the privileges of the affected application. Affected HTTP File Server 2.3.x is vulnerable; other versions may also be affected.
WebAttackRemoteAuthenticationBypassCVE-2013-6026 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote authentication bypass vulnerability in D-Link products. Additional Information Multiple vendors are prone to a remote authentication-bypass vulnerability because the application fails to properly validate session cookie. Specifically, this issue affects the 'alpha_auth_check()' function and is triggered when the user agent string is set to 'xmlset_roodkcableoj28840ybtide'. An attacker can exploit this issue to bypass the authentication mechanism and gain access to the affected device. This may aid in further attacks. The following are vulnerable: D-Link DIR-120 D-Link DI-624S D-Link DI-524UP D-Link DI-604S D-Link DI-604UP D-Link DI-604 D-Link DIR-100 D-Link TM-G5240 PLANEX COMMUNICATIONS BRL-04UR PLANEX COMMUNICATIONS BRL-04R PLANEX COMMUNICATIONS BRL-04CW Affected D-Link DIR-120 D-Link DI-624S D-Link DI-524UP D-Link DI-604S D-Link DI-604UP D-Link DI-604 D-Link DIR-100 D-Link TM-G5240 PLANEX COMMUNICATIONS BRL-04UR PLANEX COMMUNICATIONS BRL-04R PLANEX COMMUNICATIONS BRL-04CW
WebAttackRemoteFileInclude(Mantis) Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description Remote attackers may execute arbitrary PHP script code in the context of the web server hosting the affected application. Additional Information Mantis is a web-based bug tracking system. It is written in PHP and back-ended by a MySQL database. Mantis depends on include files to provide some functionality, such as dynamic generation of graphs. To generate graphs dynamically, Mantis relies upon the JpGraph library, which is invoked using a PHP include() statement. However, since Mantis does not properly validate the path to the include file, it is possible for attackers to specify an arbitrary path, either to a local file or a file on a remote server. This may lead to disclosure or execution of local files. More seriously, attackers may exploit this issue to include PHP files located on remote servers. Execution of arbitrary commands with the privileges of the webserver is the result of successful exploitation. This issue exists in the summary_graph_functions.php script. Malicious users may specify an arbitrary path as a value for the $g_jpgraph_path variable. Affected Mantis Mantis 0.15.3, 0.15.4, 0.15.5, 0.15.6, 0.15.7, 0.15.8, 0.15.9, 0.15.10, 0.15.11, 0.15.12, 0.16.0, 0.16.1, 0.17.0, 0.17.1, 0.17.2, 0.17.3 Response Exploitation of this and other remote file include issues may be limited by disabling both 'allow_url_fopen' and 'register_globals' in the local site PHP configuration. This issue has been addressed in Mantis 0.17.4 and later. Versions prior to Mantis 0.15.3 are also not affected. The vendor has announced that if an upgrade cannot be applied, the vulnerability can be addressing by inserting the following lines at the top of summary_graph_functions.php: if ( isset($HTTP_GET_VARS['g_jpgraph_path']) || isset($HTTP_POST_VARS['g_jpgraph_path']) || isset($HTTP_COOKIE_VARS['g_jpgraph_path']) ) { exit; }: Upgrades for Mantis 0.15.3 ~ 0.15.12 Mantis 0.16.0 ~ 0.16.1 Mantis 0.17.0 ~ 0.17.3 Mantis Upgrade Mantis 1.0.6
Web Attack: Remote OS Command Injection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a command injection vulnerability through HTTP requests. Additional Information OS commands can be injected through HTTP requests that can lead to execution of arbitrary code in the context of running application. Affected Various applications. Response
WebAttackRigExploitKitDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackRigExploitKitDownload5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitRedirection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitRedirection10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitRedirection11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitRedirection12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
Web Attack: Rig Exploit Kit Redirection 13 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitRedirection15 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitRedirection16 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitRedirection2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitRedirection3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitRedirection4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
Web Attack: Rig Exploit Kit Redirection 5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitRedirection7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitRedirection8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitRedirection9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitSWFDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
Web Attack: RIG Exploit Kit Website Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitWebsite12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
Web Attack: Rig Exploit Kit Website 14 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRIGExploitKitWebsite2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
Web Attack: Rig Exploit Kit Website 23 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
Web Attack: RIG Exploit Kit Website 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitWebsite4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
Web Attack: RIG Exploit Kit Website 5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
Web Attack: RIG Exploit Kit Website 6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
Web Attack: Rig Exploit Kit Website 8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
WebAttackRigExploitKitWebsite9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects a fake antivirus scan page that displays false virus scan results. Additional Information Malicious toolkits contain various exploits bundled into a single package. Victims on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one. Exploits may include MDAC, PDF, HCP etc. Affected Various Browsers
Web Attack: RocketMQ RCE CVE-2023-33246 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in RocketMQ. Additional Information RocketMQ is prone to a command injection vulnerability that can lead to execution of arbitrary code. Affected RocketMQ versions 5.1.0 and lower. Response
WebAttackRocketServergraphCVE-2014-3914 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts of leveraging multiple security vulnerabilities in Rocket Servergraph which could lead to execute arbitrary commands, compromise the application, read or write or delete arbitrary files from the file system. Additional Information Rocket Servergraph is a backup monitoring software. Rocket Servergraph is prone to the following security vulnerabilities: 1. A directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Specifically, this issue affects the 'writeDataFile' command in 'fileRequestServlet' servlet. Attackers can exploit this issue to execute arbitrary code in the context of 'SYSTEM' user. 2. A command-injection vulnerability because it fails to sufficiently sanitize user-supplied input. Specifically, this issue affects the 'run' command in 'fileRequestServlet' servlet. Attackers can exploit this issue to execute arbitrary command in the context of 'SYSTEM' user. 3. A command-injection vulnerability because it fails to sufficiently sanitize user-supplied input. Specifically, this issue affects the 'runClear' command in 'fileRequestServlet' servlet. Attackers can exploit this issue to execute arbitrary command in the context of 'SYSTEM' user. 4. A directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Specifically, this issue affects the 'readDataFile' command in 'fileRequestServlet' servlet. Attackers can exploit this issue to read arbitrary files from the file system. 5. A denial-of-service vulnerability because it fails to sufficiently sanitize user-supplied input. Specifically, this issue affects the 'del' command in 'fileRequestServlet' servlet. Attackers can exploit this issue to delete arbitrary files from the file system. 6. A command-injection vulnerability because it fails to sufficiently sanitize user-supplied input. Specifically, this issue affects the 'save_server_groups' command in 'userRequest' servlet. Attackers can exploit this issue to execute arbitrary command in the context of 'SYSTEM' user. Note: These issues affect the installations of Rocket Servergraph Admin Center for Tivoli Storage Manager Successfully exploiting these issues may allow an attacker to execute arbitrary commands, compromise the application, read or write or delete arbitrary files from the file system. Affected Rocket ServerGraph 1.2
WebattackRockliffeMailsite Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description MailSite is a program for providing access to email accounts on Microsoft Windows operating systems. Additional Information MailSite is a program for providing access to email accounts on Microsoft Windows operating systems. The MailSite HTTP mail-management agent is prone to a denial-of-service vulnerability. An error in the input validation routines of the agent causes the svchost to consume excessive amounts of CPU resources. Further information on this issue is currently not available; this BID will be updated as details become available. An attacker can exploit this issue to crash the affected application, effectively denying service to legitimate users. Affected Rockliffe MailSite 7.0.3 1 Response The vendor has released hotfixes to address this issue. Please contact the vendor for further information.
WebAttackRockwellAutomationCCWCVE-2014-5424 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute arbitrary code in the context of the application using the ActiveX control. Failed exploit attempts will likely result in denial-of-service conditions. Additional Information Rockwell Automation Connected Components Workbench is prone to multiple arbitrary code-execution vulnerabilities which affects the ActiveX component. Specifically, this issue occurs when handling specially crafted out-of-range value submitted to a particular property of the affected ActiveX control. An attacker can leverage this issue using phishing attacks. Attackers can exploit these issues to execute arbitrary code in the context of the application using the ActiveX control. Failed exploit attempts will likely result in denial-of-service conditions. Affected Rockwell Automation Connected Components Workbench (CCW) before 7.00.00
WebAttackRSAAuthenticationAgentBufferOverflowVulnerability Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a stack-based buffer overflow vulnerability specific to the Redirect function of RSA Authentication Agent for the Microsoft Internet Information Services (IIS). Additional Information RSA Security RSA Authentication Agent is a utility designed to secure network-based access to enterprise networks. The RSA Authentication Agent for Web is designed specifically to facilitate a universal interface for authentication to Web-based applications. This agent is designed to operate under Microsoft's IIS Web server. A vulnerability exists in the RSA Authentication Agent's processing method of certain HTTP requests. The vulnerability is specific to the Redirect function of the IISWebAgentIF.dll resource. The Redirect function is utilized by being invoked by HTTP requests to initiate a request redirection. The following example shows proper usage of the Redirect function (HTTP GET request): GET /WebID/IISWebAgentIF.dll?Redirect?url=Z2Fweb.gif HTTP/1.1 The vulnerable program will internally copy the string supplied as the value of the URL CGI variable into a 256-byte stack buffer. The copy operation is performed using a sprintf-like function compiled into the vulnerable binary. The URL string value is passed to the function, along with the format string specifier "%s" and the destination stack buffer pointer. A length check is not performed on the user-supplied string; therefore, if a string is supplied that is larger than the destination buffer size, the buffer will be overrun with user-supplied data. This allows the return address of the calling function or the SEH handler to be overwritten by a malicious request. Affected RSA Security RSA Authentication Agent for Web 5.0, 5.2, 5.3 Response The vendor has made fixes available for this vulnerability, though this has not been confirmed by Symantec. Users of affected packages are urged to contact the vendor for further information. Users with valid support contracts with the vendor may be able to locate fixes at https://knowledge.rsasecurity.com
WebAttackRTMPTypeConfusionCVE-2012-0779 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to exploit a remote code execution vulnerability in Adobe Flash Player. Additional Information Adobe Flash Player is a multimedia application for multiple platforms. Adobe Flash Player is prone to a remote code-execution vulnerability because of an object-type confusion error. Affected Adobe Flash Player Response Updates are available. Please see the references for more information.
WebAttackRTMPTypeConfusionCVE-2012-07792 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to exploit a remote code execution vulnerability in Adobe Flash Player. Additional Information Adobe Flash Player is a multimedia application for multiple platforms. Adobe Flash Player is prone to a remote code-execution vulnerability because of an object-type confusion error. Affected Adobe Flash Player Response Updates are available. Please see the references for more information.
WebAttackRubyOnRailsCVE-2013-0333 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an arbitrary code execution vulnerability in Ruby on Rails. Additional Information Ruby on Rails is a web application framework for multiple platforms. Ruby on Rails is prone to a security vulnerability because it fails to sanitize user-supplied input when decoding YAML input. Specifically, this issue affects the 'convert_json_to_yaml()' method of the JSON Parser. Successful exploits may allow an attacker to bypass certain security restrictions, execute arbitrary code in the context of the affected application, exploit latent vulnerabilities in the underlying database, deny service to legitimate users, or perform unauthorized actions. Other attacks are also possible. This issue is fixed in: Ruby on Rails 2.3.16 Ruby on Rails 3.0.20 Affected SuSE WebYaST 1.2 + S.u.S.E. Linux 8.1 + S.u.S.E. Linux Personal 9.1 + S.u.S.E. Linux Personal 9.0 x86_64 + S.u.S.E. Linux Personal 9.0 + S.u.S.E. Linux Personal 8.2 SuSE Studio Standard Edition 1.2 SuSE Studio Onsite 1.2 SuSE Studio Extension for System z 1.2 SuSE openSUSE 12.1 SuSE openSUSE 11.4 Ruby on Rails Ruby on Rails 3.0.13 Ruby on Rails Ruby on Rails 3.0.12 Ruby on Rails Ruby on Rails 3.0.11 Ruby on Rails Ruby on Rails 3.0.6 Ruby on Rails Ruby on Rails 3.0.5 Ruby on Rails Ruby on Rails 3.0.4 Ruby on Rails Ruby on Rails 3.0.3 Ruby on Rails Ruby on Rails 3.0.2 Ruby on Rails Ruby on Rails 3.0.1 Ruby on Rails Ruby on Rails 3.0 Ruby on Rails Ruby on Rails 2.3.11 Ruby on Rails Ruby on Rails 2.3.10 Ruby on Rails Ruby on Rails 2.3.9 Ruby on Rails Ruby on Rails 2.3.5 Ruby on Rails Ruby on Rails 2.3.4 Ruby on Rails Ruby on Rails 2.3.3 Ruby on Rails Ruby on Rails 2.3.2 Ruby on Rails Ruby on Rails 3.0.8 Ruby on Rails Ruby on Rails 3.0.7 Ruby on Rails Ruby on Rails 3.0.10 Ruby on Rails Ruby on Rails 2.3.14 Ruby on Rails Ruby on Rails 2.3.13 Ruby on Rails Ruby on Rails 2.3.12 Red Hat Fedora 17 Red Hat Fedora 16 Debian Linux 6.0 sparc Debian Linux 6.0 s/390 Debian Linux 6.0 powerpc Debian Linux 6.0 mips Debian Linux 6.0 ia-64 Debian Linux 6.0 ia-32 Debian Linux 6.0 arm Debian Linux 6.0 amd64 Avaya Voice Portal 5.1.2 Avaya Voice Portal 5.1.1 Avaya Voice Portal 5.1 SP1 Avaya Voice Portal 5.1 Avaya Voice Portal 5.0 SP2 Avaya Voice Portal 5.0 SP1 Avaya Voice Portal 5.0 Avaya Secure Access Link Gateway 2.0 Avaya Secure Access Link Gateway 1.8 Avaya Secure Access Link Gateway 1.5 Avaya Integrated Management Suite (IMS) 0 Avaya CVLAN Avaya Aura System Manager 6.2 Avaya Aura System Manager 6.1.3 Avaya Aura System Manager 6.1.2 Avaya Aura System Manager 6.1.1 Avaya Aura System Manager 6.1 SP2 Avaya Aura System Manager 6.1 Sp1 Avaya Aura System Manager 6.1 Avaya Aura System Manager 6.0 SP1 Avaya Aura System Manager 6.0 Avaya Aura Presence Services 6.1.1 Avaya Aura Presence Services 6.1 Avaya Aura Presence Services 6.0 Avaya Aura Presence Services 5.2 Avaya Aura Experience Portal 6.0 Avaya Aura Application Enablement Services 5.2.1 Avaya Aura Application Enablement Services 4.2.3 Avaya Aura Application Enablement Services 4.2.2 Avaya Aura Application Enablement Services 4.2.1 Avaya Aura Application Enablement Services 4.0.1 Avaya Aura Application Enablement Services 5.2.3 Avaya Aura Application Enablement Services 5.2.2 Avaya Aura Application Enablement Services 5.2 Avaya Aura Application Enablement Services 4.2 Avaya Aura Application Enablement Services 4.1 Avaya Aura Application Enablement Services 4.0 Apple Mac Os X Server 10.7.4 Apple Mac Os X Server 10.7.3 Apple Mac Os X Server 10.7.2 Apple Mac Os X Server 10.7.1 Apple Mac Os X Server 10.7 Apple Mac Os X Server 10.6.8 Apple Mac Os X 10.7.4 Apple Mac Os X 10.7.3 Apple Mac Os X 10.7.2 Apple Mac Os X 10.7.1
Web Attack: Ruby on Rails CVE-2020-8163 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Remote Code Execution vulnerability on the affected machine. Additional Information Ruby on Rails is a web application framework for multiple platforms. Action Pack is a component in Ruby on Rails for handling and responding to web requests. There is a code injection vulnerability in versions of Rails prior to 5.0.1 that wouldallow an attacker who controlled the `locals` argument of a `render` call to perform a Remote Code Execution. Affected Ruby on Rails prior to version 5.0.1 Response
Web Attack: Ruby On Rails Information Disclosure CVE-2019-5418 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an information disclosure vulnerability in Ruby on Rails. Additional Information There is a file content disclosure vulnerability in Action View in Ruby on Rails. Specially crafted accept headers in combination with calls to render file can cause arbitrary files on the target server to be rendered, disclosing the file contents. Affected Various Ruby on Rails versions. Response