text
stringlengths
0
383k
WebAttackSafariApplescriptExecCVE-2015-7007 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Signature detects attempts to exploit applescript editor to execute arbitrary code. Successfully exploits will lead to victim machine compromised. Additional Information Signature detects attempts to exploit applescript editor to execute arbitrary code. Successfully exploits will lead to victim machine compromised. Affected Mac OS X before 10.11.1
WebAttackSafariCVE-2017-2316 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description An attacker can exploit this issue to cause arbitrary file execution and arbitrary file read. Additional Information HelpViewer's WebView has an inside protocol handler "x-help-script" that could be used to open an arbitrary local file. Therefore if we can run arbitrary Javascript code, we'll win easily and, of course, we can read an arbitrary local file with a XMLHttpRequest. HelpViewer checks whether the path of the url is in a valid help file or not. But we can bypass this with a double encoded "../". Affected Multiple version of safari. Response Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at:[email protected].
WebAttackSakuraExecutableDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Browsers
WebAttackSakuraExploitKitJarDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Browsers
WebAttackSakuraExploitKitWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Browsers
WebAttackSakuraExploitKitWebsite4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Browsers
WebAttackSakuraExploitKitWebsite5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Browsers
WebAttackSakuraExploitKitWebsite6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Browsers
WebAttackSakuraExploitKitWebsite7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Browsers
Web Attack: Sakura Exploit Kit Website 8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Browsers
WebAttackSakuraExploitToolkitWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSakuraExploitToolkitWebsite2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSakuraExploitToolkitWebsite3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSalesLogixServerSQLInjectionVulnerability Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a SQL injection vulnerability in the SalesLogix server. Additional Information Best Software SalesLogix is a client-server application designed to facilitate communication between a corporation and its customers. It is commercially available for the Microsoft Windows platform. The issue is an SQL injection vulnerability. Apparently, it is possible to inject SQL syntax into queries by sending malicious SQL through the 'id' parameter of the 'view' script of the 'slxweb.dll' library. This may facilitate corruption or disclosure of sensitive data, including authentication credentials. Affected Best Software SalesLogix SalesLogix Corporation SalesLogix 2000.0 Response Updates have been released that resolve these issues. These updates are reportedly available to registered customers through the vendor's support portal. See the referenced support page for more information.
WebAttackSaltStackArbitraryDirectoryAccessCVE-2020-11652 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit vulnerability on the affected machine. Additional Information The Salt-master process is prone to a vulnerability that allows arbitrary directory access to authenticated users. Affected SaltStack Salt before 2019.2.4 and 3000 before 3000.2. Response
Web Attack: SaltStack RCE CVE-2021-25281 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in SaltStack. Additional Information A vulnerability exists in SaltStack that can lead to execution of arbitrary code. Affected SaltStack Salt before 3002.5. Response
Web Attack: SaltStack Remote Code Execution CVE-2020-16846 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempts to exploit a shell injection vulnerability in SaltStack. Additional Information A shell injection vulnerability exists in SaltStack where an unauthenticated user with network access to the Salt API can use shell injections to run code using the SSH client. Affected SaltStack Salt through 3002. Response
WebAttackSaltStackSecurityByPassCVE-2020-11651 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit security bypass s vulnerability in SaltStack Salt. Additional Information Salt is a central system and configuration manager. Salt is prone to the following multiple remote security-bypass vulnerabilities: 1. A security-bypass vulnerability. Specifically, the issue occurs because the 'salt-master' process 'ClearFuncs' class does not properly validate method calls. An attacker can exploit this issue to access some methods without authentication. This may used to retrieve user tokens from the salt master and run arbitrary commands on salt minions. [CVE-2020-11651] 2. A security-bypass vulnerability. Specifically, the issue affects the 'salt-master' process of the 'ClearFuncs' class.This may allows access to some methods that improperly sanitize paths and arbitrary directory access to authenticated users. [CVE-2020-11652] Successfully exploiting these issues will allow attackers to bypass security restrictions and perform unauthorized actions; this may aid in launching further attacks. Affected SaltStack Salt before 2019.2.4 and 3000 before 3000.2 Response Updates are available. Please see the references or vendor advisory for more information.
WebAttackSaltStackSecurityByPassCVE-2020-11652 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit security bypass s vulnerability in SaltStack Salt. Additional Information Salt is a central system and configuration manager. Salt is prone to the following multiple remote security-bypass vulnerabilities: 1. A security-bypass vulnerability. Specifically, the issue occurs because the 'salt-master' process 'ClearFuncs' class does not properly validate method calls. An attacker can exploit this issue to access some methods without authentication. This may used to retrieve user tokens from the salt master and run arbitrary commands on salt minions. [CVE-2020-11651] 2. A security-bypass vulnerability. Specifically, the issue affects the 'salt-master' process of the 'ClearFuncs' class.This may allows access to some methods that improperly sanitize paths and arbitrary directory access to authenticated users. [CVE-2020-11652] Successfully exploiting these issues will allow attackers to bypass security restrictions and perform unauthorized actions; this may aid in launching further attacks. Affected SaltStack Salt before 2019.2.4 and 3000 before 3000.2 Response Updates are available. Please see the references or vendor advisory for more information.
WebAttackSamsungNET-iwareCVE-2012-4333 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a buffer overflow vulnerability in Samsung NET-i ware which could result in a denial of service or remote code execution. Additional Information Samsung NET-i ware is prone to multiple buffer overflow conditions related to the BackUpToAvi ActiveX Control. The issue is triggered when parsing an overly long string in the 'BackUpToAvi' property resulting in a heap-based buffer overflow. Affected Samsung NET-i ware 1.37 and prior are vulnerable; other versions may also be affected.
WebAttackSamsungSecurityManagerRCE Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to execute arbitrary code on the server with SYSTEM privileges. Failed exploit attempts will likely result in denial-of-service conditions. Additional Information Samsung Security Manager is prone to multiple remote code-execution vulnerabilities due to an error in the 'PUT' and 'MOVE' methods. Specifically, these issues affect the 'ActiveMQ' broker service. An attacker can exploit these issues by sending specially crafted HTTP 'PUT' request and an HTTP 'MOVE' request. Affected Versions prior to Samsung Security Manager 1.31.
Web Attack: Sangoma FreePBX Auth Bypass CVE-2019-19006 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an authentication bypass vulnerability in Sangoma FreePBX. Additional Information A vulnerability exists in Sangoma FreePBX that can lead to authentication bypass. Affected Sangoma FreePBX 115.0.16.26 and below, 14.0.13.11 and below, 13.0.197.13 and below. Response
WebAttackSAPCrystalReportsCVE-2010-2590 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a buffer overflow vulnerability in SAP Crystal Reports which may result in remote code execution. Additional Information SAP Crystal Reports Print ActiveX control is a component that allows users to view crystal reports. SAP Crystal Reports is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The vulnerability affects the 'ServerResourceVersion' property of the 'CrystalReports12.CrystalPrintControl.1' ActiveX control ('PrintControl.dll'). The ActiveX control is identified by CLSID: 88DD90B6-C770-4CFF-B7A4-3AFD16BB8824. An attacker can exploit this issue by enticing an unsuspecting user to view a malicious HTML page. Successful exploits allow remote attackers to execute arbitrary code in the context of the application (typically Internet Explorer) using the ActiveX control. Failed exploit attempts will likely result in denial-of-service conditions. Affected SAP Crystal Reports 2008
WebAttackSAPCrystalReportsCVE-2010-25902 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a buffer overflow vulnerability in SAP Crystal Reports which may result in remote code execution. Additional Information SAP Crystal Reports Print ActiveX control is a component that allows users to view crystal reports. SAP Crystal Reports is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The vulnerability affects the 'ServerResourceVersion' property of the 'CrystalReports12.CrystalPrintControl.1' ActiveX control ('PrintControl.dll'). The ActiveX control is identified by CLSID: 88DD90B6-C770-4CFF-B7A4-3AFD16BB8824. An attacker can exploit this issue by enticing an unsuspecting user to view a malicious HTML page. Successful exploits allow remote attackers to execute arbitrary code in the context of the application (typically Internet Explorer) using the ActiveX control. Failed exploit attempts will likely result in denial-of-service conditions. Affected SAP Crystal Reports 2008
WebAttackSAPCrystalReportsCVE-2010-25903 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt to exploit a buffer overflow vulnerability in SAP Crystal Reports which may result in remote code execution. Additional Information SAP Crystal Reports Print ActiveX control is a component that allows users to view crystal reports. SAP Crystal Reports is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The vulnerability affects the 'ServerResourceVersion' property of the 'CrystalReports12.CrystalPrintControl.1' ActiveX control ('PrintControl.dll'). The ActiveX control is identified by CLSID: 88DD90B6-C770-4CFF-B7A4-3AFD16BB8824. An attacker can exploit this issue by enticing an unsuspecting user to view a malicious HTML page. Successful exploits allow remote attackers to execute arbitrary code in the context of the application (typically Internet Explorer) using the ActiveX control. Failed exploit attempts will likely result in denial-of-service conditions. Affected SAP Crystal Reports 2008
WebAttackSAPManagementConsoleOSEXEC Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detect attempts to exploit a remote code execution vulnerability in SAP Management Console Additional Information SAP Management Console provides a common framework for centralized system management. SAP Management Console is prone to a remote code-execution vulnerability. This issue affects the SOAP interface when handling a malicious 'OSExecute' payload. In order to exploit this issue an attacker must have access to a valid username and password. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Successful exploits will compromise the affected application and possibly the underlying computer. Failed exploit attempts will result in a denial-of-service condition. This BID is being retired. The issue described is a feature of the application requiring administrative access. No privileges are gained. Affected SAP Management Console Response Currently, we are not aware of any vendor supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Web Attack: SAP NetWeaver Arbitrary File Upload CVE-2021-38163 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an arbitrary file upload vulnerability in SAP Netweaver Additional Information A vulnerability exists in SAP Netweaver that can lead to arbitrary file upload later resulting in arbitrary code execution. Affected SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50. Response
Web Attack: SAP NetWeaver Server CVE-2020-6287 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempts to exploit an authentication bypass vulnerability in SAP NetWeaver Application. Additional Information A critical vulnerability exists in SAP NetWeaver Java application server that can lead to authentication bypass. Affected Versions - 7.30, 7.31, 7.40, 7.50. Response
Web Attack: SAP Remote Code Execution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability on SAP servers. Additional Information Insecurely configured SAP machines can be compromised by attackers to run arbitrary code on the vulnerable SAP servers. Affected Various SAP servers. Response
WebAttackSAPSolutionManagerCVE-2020-6207 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an authentication bypass vulnerability in SAP Solution Manager. Additional Information SAP Solution Manager is prone to a vulnerability that can lead to authentication bypass. Affected SAP Solution Manager - version 7.2. Response
Web Attack: Sar2HTML 3.2.1 Remote Command Execution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to execute remote command injection with the privileges of the user running the affected application. Additional Information The index.php script in Sar2HTML 3.2.1 is vulnerable to remote command execution.The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when handling a crafted HTTP request. A remote attacker may be able to exploit this to execute arbitrary commands within the context of the application, via a crafted HTTP request. Affected Sar2HTML 3.2.1 Response Currently we are unaware of any vendor supplied patch or updates available for this issue.
WebAttackScanbotScannerRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Masscan scans on the machine. Additional Information Masscan is a scanning tool that scans and alerts on vulnerabilities found on remote machines. Affected Various Platforms. Response
WebAttackScanBoxWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSchneiderElectricOFSCVE-2014-0774 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts of leveraging a stack buffer overflow in Schneider Electric OPC Factory Server (OSF) which could lead to arbitrary code execution. Additional Information Schneider Electric products provide solutions to energy management. Schneider Electric OPC Factory Server (OSF) is prone to a local stack-based buffer-overflow vulnerability because they fail to properly bounds-check user-supplied data. Specifically, this issue occurs while parsing the malformed configuration file. This issue can be exploited to gain privileges through vectors involving a malformed configuration file. Attackers can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition. Affected TLXCDSUOFS33 v3.35 TLXCDSTOFS33 v3.35 TLXCDLUOFS33 v3.35 TLXCDLTOFS33 v3.35 TLXCDLFOFS33 v3.35
WebAttackSchneiderElectricProductsCVE-2019-6814SecurityBypass Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Security Bypass vulnerability on the affected machine. Additional Information Schneider Electric Pelco Endura NET55XX Encoder is vulnerable to Security Bypass attack. Successfully exploiting these issues will allow attackers to change the SSH service and change the root password within the context of the application. Affected Schneider Electric Pelco Endura NET55XX Encoder prior to version 2.1.9.7 Response
WebAttackSchneiderElectricU.MotionBuilderRCECVE-2018-7841 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Schneider Electric U.Motion Builder. Additional Information A vulnerability exists in Schneider Electric U.Motion Builder that can lead to execution of arbitrary code. Affected Schneider Electric U.motion Builder software versions prior to v1.3.4. Response
Web Attack: SCO Skunkware ViewSrc Directory Traversal CVE-1999-0174 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects attempts to access the View Source CGI program through HTTP. Additional Information view-source is a script included with the httpd package bundled with Skunkware 2.0. Skunkware 2.0 is a variant of the UNIX Operating System distributed by Santa Cruz Operations. A problem in the handling of slashes and dots when appended to the view-source script could allow access to restricted files remotely. By appending a series of double-dots and slashes to a query using the view-source script, it is possible to traverse the directory structure on a web server. This allows you to view the contents of directories, and files that are readable by the UID of the httpd process, and makes it possible for a user with malicious motives to read files on a remote system and gather intelligence for an attack against the system, as well as other potentially sensitive information. Affected SCO Skunkware 2.0 Response Upgrade to SCO Skunkware 2000 or newer: http://www.sco.com/skunkware/
WebAttackSeaCMSAuthenticatedPHPCodeExecutionCVE-2017-17561 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit PHP code execution vulnerability on the affected machine. Additional Information SeaCMSis vulnerable to authenticated PHP Code Execution attack. Successfully exploiting these issues will allow low privileged attackers to execute arbitrary code within the context of the application. Affected SeaCMS 6.56 Response
WebAttackSeaCMSPHPCodeExecution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit PHP code execution vulnerability on the affected machine. Additional Information Multiple version of SeaCMS are vulnerable to PHP remote code execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected Various SeaCMS. Response
Web Attack: Seeyon Office HTML Servlet Arbitrary File Upload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit an arbitrary file upload vulnerability in Seeyon Office HTML servlet. Additional Information An arbitrary file upload vulnerability exists in Seeyon Office HTML servlet that can lead to execution of abitrary code. Affected Various Platforms. Response
WebAttackSeosploitMaliciousExploitKitRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
WebAttackSeosploitRequest Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Affected Various Response Update all vendor patches to the latest versions.
Web Attack: Seowon SlC 130 Router CVE-2020-17456 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Remote Code Execution vulnerability on the affected machine. Additional Information Seowon SlC 130 Router is vulnerable to Remote Code Execution attack. User can run arbitrary commands on the router as root. This issue results from the use of hard-coded encryption key. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. An attacker can exploit this issue to execute arbitrary code within the context of the device. Failed exploit attempts will likely cause a denial-of-service condition. Affected Seowon SlC 130 Router. Response
WebAttackSEPMDirectoryTraversal Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit multiple security bypass vulnerability in Symantec Endpoint Protection and Symantec Endpoint Protection Manager. Additional Information SEP/SEPM is prone to a multiple vulnerabilities which includes - authentication bypass, arbitrary read/write, SQL injection, path traversal. Affected SEP/SEPM
Web Attack: SEPM SQL Injection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit multiple security bypass vulnerability in Symantec Endpoint Protection and Symantec Endpoint Protection Manager. Additional Information SEP/SEPM is prone to a multiple vulnerabilities which includes - authentication bypass, arbitrary read/write, SQL injection, path traversal. Affected SEP/SEPM
WebAttackSerenityExploitKit2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Serenity toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Serenity Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Web Browsers
WebAttackServUWebClientHttpRequestBO Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This Signature detects attempts to cause buffer overflow in the Serv-U Web Client. Additional Information RhinoSoft Serv-U Web Client is a browser-based application for transferring files. The application is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The issue occurs when handling overly long session cookies. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. Serv-U Web Client 9.0.0.5 is vulnerable; other versions prior to Serv-U Web Client 9.1.0.0 may also be affected. Affected RhinoSoft Serv-U Web Client Response Updates are available. Please see the references for details.
Web Attack: SGI InfoSearch fname Exec CVE-2000-0207 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to execute the infosrch CGI script that allows remote commands to be executed with the web server's privileges. Additional Information The InfoSearch package converts man pages and other documentation into HTML web content. The search form uses infosrch.cgi which does not properly parse user input in the 'fname' variable, allowing commands to be executed at the webserver privilege level by remote web users. Affected SGI InfoSearch 1.0 SGI IRIX 6.5, 6.5.1, 6.5.2 m, 6.5.3, 6.5.3 f, 6.5.3 m, 6.5.4, 6.5.6, 6.5.7 Response From the SGI Advisory (attached in full in the 'Credit' section): Although patches are available for this issue, it is realized that there may be situations where installing the patches immediately maynnot be possible. The steps below can be used to disable the infosrch.cgi(1) program tonprevent exploitation of this vulnerability until patches can be installed. 1) Become the root user on the system. % /bin/su -n Password: # 2) Change the permissions on the infosrch.cgi(1) program. ================= **** WARNING **** ================= Removing the permissions from the infosrch.cgi(1) program will prevent non-root users from using the Infosearch subsystem through the HTTP web server. # /bin/chmod 500 /usr/lib/infosearch/bin/infosrch.cgi 3) Return to previous level. # exit % --- For another workaround, see "Re: Vulnerability in infosrch.cgi" in Credit. SGI IRIX 6.5: SGI Patch Infosrch.cgi Patchset SGI Upgrade Maintenance Releases SGI Patch 4060 SGI Patch 4381 SGI Upgrade IRIX 6.5.14 Maintenance Release SGI Patch 4416 SGI Patch 4574 SGI Upgrade IRIX 6.5.18 SGI Patch 4799 SGI Upgrade IRIX 6.5.19 SGI Upgrade Java SDK 1.4.1 SGI Upgrade Runtime Plug-in for IRIX, Java 1.4.1 SGI Patch patch4915.tar SGI Patch websetup.tardist SGI IRIX 6.5.3: SGI Patch Infosrch.cgi Patchset SGI Upgrade Maintenance Releases SGI Patch 4060 SGI Upgrade IRIX 6.5.14 Maintenance Release SGI Patch 4416 SGI Patch 4574 SGI Upgrade IRIX 6.5.18 SGI Patch 4799 SGI Upgrade IRIX 6.5.19 SGI Upgrade Java SDK 1.4.1 SGI Upgrade Runtime Plug-in for IRIX, Java 1.4.1 SGI Patch patch4915.tar SGI Patch websetup.tardist SGI IRIX 6.5.4: SGI Patch Infosrch.cgi Patchset SGI Upgrade Maintenance Releases SGI Patch 4060 SGI Upgrade IRIX 6.5.14 Maintenance Release SGI Patch 4416 SGI Patch 4574 SGI Upgrade IRIX 6.5.18 SGI Patch 4799 SGI Upgrade IRIX 6.5.19 SGI Upgrade Java SDK 1.4.1 SGI Upgrade Runtime Plug-in for IRIX, Java 1.4.1 SGI Patch patch4915.tar SGI Patch websetup.tardist SGI IRIX 6.5.3 f: SGI Patch Infosrch.cgi Patchset SGI Upgrade Maintenance Releases SGI Patch 4060 SGI Patch 4382 SGI Patch 4416 SGI Patch 4574 SGI Patch 4799 SGI IRIX 6.5.2 m: SGI Patch Infosrch.cgi Patchset SGI Upgrade Maintenance Releases SGI Patch 4060 SGI Patch 4381 SGI Patch 4416 SGI Patch 4574 SGI Patch 4799 SGI IRIX 6.5.3 m: SGI Patch Infosrch.cgi Patchset SGI Upgrade Maintenance Releases SGI Patch 4060 SGI Patch 4381 SGI Patch 4416 SGI Patch 4574 SGI Patch 4799 SGI IRIX 6.5.1: SGI Patch Infosrch.cgi Patchset SGI Upgrade Maintenance Releases SGI Patch 4060 SGI Patch 4381 SGI Upgrade IRIX 6.5.14 Maintenance Release SGI Patch 4416 SGI Patch 4574 SGI Upgrade IRIX 6.5.18 SGI Patch 4799 SGI Upgrade IRIX 6.5.19 SGI Upgrade Java SDK 1.4.1 SGI Upgrade Runtime Plug-in for IRIX, Java 1.4.1 SGI Patch patch4915.tar SGI Patch websetup.tardist SGI IRIX 6.5.6: SGI Patch Infosrch.cgi Patchset SGI Upgrade Maintenance Releases SGI Upgrade IRIX 6.5.14 Maintenance Release SGI Patch 4416 SGI Patch 4574 SGI Upgrade IRIX 6.5.18 SGI Patch 4799 SGI Upgrade IRIX 6.5.19 SGI Upgrade Java SDK 1.4.1 SGI Upgrade Runtime Plug-in for IRIX, Java 1.4.1 SGI Patch patch4915.tar SGI Patch websetup.tardist SGI IRIX 6.5.7: SGI Patch Infosrch.cgi Patchset SGI Patch 4060 SGI Patch patch4123 SGI Upgrade IRIX 6.5.14 Maintenance Release SGI Patch 4416 SGI Patch 4574 SGI Upgrade IRIX 6.5.18 SGI Patch 4799 SGI Upgrade IRIX 6.5.19 SGI Upgrade Java SDK 1.4.1 SGI Upgrade Runtime Plug-in for IRIX, Java 1.4.1 SGI Patch patch4915.tar SGI Patch websetup.tardist
WebAttackShadowStreamRecorderASXFileBO Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a buffer overflow vulnerability in Mini-stream Software products which could result in remote code execution. Additional Information Mini-stream Software provides multimedia applications for Microsoft Windows platforms. Multiple Mini-stream Software products are prone to a remote stack-based buffer-overflow vulnerability because they fail to perform adequate checks on user-supplied input. The vulnerability occurs when handling '.asx' files. Specifically, the application fails to check the length of the 'href' parameter of the 'ref' tag. Successfully exploiting this issue may allow remote attackers to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Affected This issue affect the following products: RM-MP3 Converter 3.0.0.7 Ripper 3.0.1.1 ASX to MP3 Converter 3.0.0.7
WebAttackSharePointXSSCVE-2011-1893 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a XSS vulnerability in Microsoft SharePoint. Additional Information There exists a XSS vulnerability in Microsoft SharePoint which results in an elevation of privilege. Affected NA Response NA
WebAttackSharpshooterWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious payload activity served by SharpShooter. Additional Information SharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source code. Affected N/A Response
WebAttackShellcodeDownloadActivity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to download various shellcodes, which can used to perform various harmful activities on user's system. Additional Information An attacker can use various shellcode to execute arbitrary code with the privileges of the user running the application. Affected Various platforms
WebAttackShellcodeDownloadActivity2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to download various shellcodes, which can used to perform various harmful activities on user's system. Additional Information An attacker can use various shellcode to execute arbitrary code with the privileges of the user running the application. Affected Various platforms
WebAttackShellcodeDownloadActivity4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to download various shellcodes, which can used to perform various harmful activities on user's system. Additional Information An attacker can use various shellcode to execute arbitrary code with the privileges of the user running the application. Affected Various platforms
WebAttackShellcodeDownloadActivity5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to download various shellcodes, which can used to perform various harmful activities on user's system. Additional Information An attacker can use various shellcode to execute arbitrary code with the privileges of the user running the application. Affected Various platforms
Web Attack: Shenzhen TVT DVR Remote Code Execution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit a remote code execution vulnerability in Shenzhen TVT DVR. Additional Information Shenzhen TVT DVR is affected by a vulnerability that can be exploited to run arbitrary commands leading to remote code execution. Affected Shenzhen TVT DVR. Response
WebAttackSiberiaToolkitActivity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Siberia Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Additional Information Siberia Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Platforms Response NA
WebAttackSiberiaToolkitDownloadAttack2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Siberia Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Additional Information Siberia Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Platforms Response NA
WebAttackSibhostExploitKitRedirect Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Sibhost toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Sibhost Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Web Browsers
WebAttackSibhostExploitKitWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Sibhost toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Sibhost Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine. Affected Various Web Browsers
WebAttackSibhostJARFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSibhostSWFFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSickbeardRemoteCommandInjection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a command injection vulnerability in Sickbeard 0.1 Additional Information Sickbeard 0.1 is prone to a vulnerability that can lead to execution of arbitrary commands. Affected Sickbeard 0.1 Response
WebAttackSiemensSIMATICWinCCCVE-2013-0674 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a vulnerability in Siemens SIMATIC WinCC SCADA which may result in remote code execution. Additional Information Siemens SIMATIC WinCC And PCS 7 are prone to the following security vulnerabilities: 1. An information-disclosure vulnerability occurs because application fails to properly restrict user access to the embedded MS SQL database. Specifically, this issue occurs because the WinCC stores user passwords for WebNavigator in an MS SQL database. Attackers can exploit this issue to gain knowledge of otherwise restricted password fields. CVE-2013-0678 2. An information-disclosure vulnerability occurs because application provides too many rights to several users in the database. Attackers can exploit this issue to gain knowledge of password fields. CVE-2013-0676 3. A directory-traversal vulnerability occurs because it returns sensitive data if certain file names and paths are queried. This issue can be exploited by sending a specially crafted URI request containing directory-traversal sequences. CVE-2013-0679 4. A remote buffer-overflow vulnerability occurs in 'RegReader' ActiveX control. Specifically, this issue occurs because it does not properly bounds check the length of the parameters. due to an unspecified error in the CVE-2013-0674 5. An information-disclosure vulnerability occurs because it allows parsing of project files insecurely. Attackers can exploit his issue by tricking a user into opening a specially crafted project file. CVE-2013-0677 6. A remote buffer-overflow vulnerability occurs due to an error when handling certain network packets in the WinCC central communications component ('CCEServer'). Attackers can exploit this issue using specially crafted packets. CVE-2013-0675 Note: Successful exploit of issues #1, #2 and #3 requires authentication. An attacker can exploit these issues to gain access to sensitive information, arbitrary system files, and execute arbitrary code in the context of the application (typically Internet Explorer) that uses the ActiveX control. Failed exploit attempts will result in a denial-of-service conditions. Affected Versions prior to Siemens SIMATIC WinCC 7.2 and Siemens SIMATIC PCS 7 8.0 SP1 are vulnerable.
WebAttackSiemensSIMATICWinCCCVE-2013-06742 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a vulnerability in Siemens SIMATIC WinCC SCADA which may result in remote code execution. Additional Information Siemens SIMATIC WinCC And PCS 7 are prone to the following security vulnerabilities: 1. An information-disclosure vulnerability occurs because application fails to properly restrict user access to the embedded MS SQL database. Specifically, this issue occurs because the WinCC stores user passwords for WebNavigator in an MS SQL database. Attackers can exploit this issue to gain knowledge of otherwise restricted password fields. CVE-2013-0678 2. An information-disclosure vulnerability occurs because application provides too many rights to several users in the database. Attackers can exploit this issue to gain knowledge of password fields. CVE-2013-0676 3. A directory-traversal vulnerability occurs because it returns sensitive data if certain file names and paths are queried. This issue can be exploited by sending a specially crafted URI request containing directory-traversal sequences. CVE-2013-0679 4. A remote buffer-overflow vulnerability occurs in 'RegReader' ActiveX control. Specifically, this issue occurs because it does not properly bounds check the length of the parameters. due to an unspecified error in the CVE-2013-0674 5. An information-disclosure vulnerability occurs because it allows parsing of project files insecurely. Attackers can exploit his issue by tricking a user into opening a specially crafted project file. CVE-2013-0677 6. A remote buffer-overflow vulnerability occurs due to an error when handling certain network packets in the WinCC central communications component ('CCEServer'). Attackers can exploit this issue using specially crafted packets. CVE-2013-0675 Note: Successful exploit of issues #1, #2 and #3 requires authentication. An attacker can exploit these issues to gain access to sensitive information, arbitrary system files, and execute arbitrary code in the context of the application (typically Internet Explorer) that uses the ActiveX control. Failed exploit attempts will result in a denial-of-service conditions. Affected Versions prior to Siemens SIMATIC WinCC 7.2 and Siemens SIMATIC PCS 7 8.0 SP1 are vulnerable.
WebAttackSiemensSolidEdgeMemoryCorruption Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a memory corruption vulnerability in Siemens Solid Edge which could result in remote code execution. Additional Information Siemens Solid Edge SEListCtrlX ActiveX control is prone to a memory corruption vulnerability. Specifically, this issue affects the 'SetItemReadOnly()' function of the 'control.dll' ActiveX control and is triggered when processing a specially crafted input. The ActiveX control is identified by the following CLSID: 5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D Affected Siemens Solid Edge
WebAttackSiemensSolidEdgeMemoryCorruption2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a memory corruption vulnerability in Siemens Solid Edge which could result in remote code execution. Additional Information Siemens Solid Edge SEListCtrlX ActiveX control is prone to a memory corruption vulnerability. Specifically, this issue affects the 'SetItemReadOnly()' function of the 'control.dll' ActiveX control and is triggered when processing a specially crafted input. The ActiveX control is identified by the following CLSID: 5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D Affected Siemens Solid Edge
WebAttackSiemensSolidEdgeMemoryCorruption3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a memory corruption vulnerability in Siemens Solid Edge which could result in remote code execution. Additional Information Siemens Solid Edge SEListCtrlX ActiveX control is prone to a memory corruption vulnerability. Specifically, this issue affects the 'SetItemReadOnly()' function of the 'control.dll' ActiveX control and is triggered when processing a specially crafted input. The ActiveX control is identified by the following CLSID: 5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D Affected Siemens Solid Edge
WebAttackSiemensSolidEdgeMemoryCorruption4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a memory corruption vulnerability in Siemens Solid Edge which could result in remote code execution. Additional Information Siemens Solid Edge SEListCtrlX ActiveX control is prone to a memory corruption vulnerability. Specifically, this issue affects the 'SetItemReadOnly()' function of the 'control.dll' ActiveX control and is triggered when processing a specially crafted input. The ActiveX control is identified by the following CLSID: 5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D Affected Siemens Solid Edge
WebAttackSilenceBankingTrojanAttack Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Banking Trojan activity on the compromised computer. Additional Information Banking Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Multiple Response
WebAttackSilentSignatureforPathTraversing Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects unclassified Trojan activity on the compromised computer. Additional Information Trojans allow the remote attackers to perform various malicious activities on the compromised machine. Affected Various platforms Response NA
WebAttackSkinCrafterActiveXCVE-2012-2271 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Skin Crafter is a software that is used to create custom skins for different windows applications. A buffer overflow vulnerability exists in version 3.0 that can allow remote code execution. Additional Information The vulnerability lies in the COM component used by the product SkinCrafter from DMSoft Technologies(http://www.dmsofttech.com/projects.html). This COM component, SkinCrafter3_vs2005.dll, implememnts a function InitLicenKeys, whose parameter is not checked for the bounds, hence leading to the overflow condition. Affected Windows Response Upgrade to higher version of Skin Crafter.
WebAttackSkypeInformationDisclosureVulnerabilityCVE-2022-26911 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an arbitrary file read vulnerability in Skype for BusinessB/MS Lync. Additional Information Skype for BusinessB/MS Lync is prone to an Arbitrary File Read vulnerability for an internal site that allows Information Disclosure. Affected Before Microsoft Lync Server 2013 CU10 Response
WebAttackSlackDesktopRemoteCodeExecution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Remote Code Execution vulnerability on the affected machine. Additional Information Slack Desktop is vulnerable to Remote Code Execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected Slack for Desktop (Mac/Windows/Linux) prior to version 4.4 Response
WebAttackSMTPCredentialsTheftAttempt Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the malicious websites or servers hosting services that attempts to steal user information. Additional Information Hackers design websites or servers hosting services that can enable them to steal user related information that can later be used to gain access to their computers. Affected Various platforms. Response
WebAttackSMTPCredentialsTheftAttempt_1 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the malicious websites or servers hosting services that attempts to steal user information. Additional Information Hackers design websites or servers hosting services that can enable them to steal user related information that can later be used to gain access to their computers. Affected Various platforms. Response
Web Attack: SMTP Domino SMTP ENVID BO Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description Remote attackers may exploit this vulnerability to execute arbitrary machine code in the context of the affected service. Additional Information The Lotus SMTP Server is part of the integrated solutions offered in Lotus Domino and Notes server software packages. A vulnerability exists in the SMTP server that can allow a malicious user to remotely execute code on the server. The problem exists in the ENVID variable, as specified in RFC 1891. The SMTP server does not conduct adequate bounds checking on the ENVID keyword of the "MAIL FROM:" field. This makes it possible for a malicious user to custom craft an ENVID that could result in remote execution of code as the UID that the SMTP server is operating as. In the event of successful overflow, the Notes server will crash, and all Notes services will discontinue functioning, regardless of successful execution of code. The Notes server will then require a manual restart, and additionally may require manual removal of mail.box and/or log.nsf files. Affected Lotus Domino Enterprise Server 5.0.1, 5.0.2, 5.0.2 b, 5.0.3, 5.0.4 Lotus Domino Mail Server 5.0.1, 5.0.2, 5.0.2 b, 5.0.3, 5.0.4 Response S.A.F.E.R recommends that all users of Lotus Packages upgrade to the most recent release, currently 5.05. A link to the Lotus update page follows: Lotus Domino Enterprise Server 5.0.1: Lotus Upgrade 5.05 Lotus Domino Enterprise Server 5.0.2: Lotus Upgrade 5.05 Lotus Domino Enterprise Server 5.0.2 b: Lotus Upgrade 5.05 Lotus Domino Enterprise Server 5.0.3: Lotus Upgrade 5.05 Lotus Domino Enterprise Server 5.0.4: Lotus Upgrade 5.05 Lotus Domino Mail Server 5.0.1: Lotus Upgrade 5.05 Lotus Domino Mail Server 5.0.2: Lotus Upgrade 5.05 Lotus Domino Mail Server 5.0.2 b: Lotus Upgrade 5.05 Lotus Domino Mail Server 5.0.3: Lotus Upgrade 5.05 Lotus Domino Mail Server 5.0.4: Lotus Upgrade 5.05
WebAttackSMTPEXPNVintraDoS Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description This signature detects a malformed command sent to the Vintra Mail Server Additional Information Older versions of the Vintra SMTP MailServer allow remote attackers to cause a denial of service via a malformed "EXPN *@" command. Affected Vintra Mail Server Response Upgrade to a new version of Vintra Mail Server Professional
Web Attack: SnakeYAML Library CVE-2022-1471 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Unsafe Deserialization vulnerability on the affected machine. Additional Information SnakeYAML library is vulnerable to Unsafe Deserialization attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected SnakeYAML library up to (excluding) version 2.0 Response
Web Attack: SnakeYAML Library CVE-2022-1471 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Unsafe Deserialization vulnerability on the affected machine. Additional Information SnakeYAML library is vulnerable to Unsafe Deserialization attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected SnakeYAML library up to (excluding) version 2.0 Response
WebAttackSoakSoakExploitActivity2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
Web Attack: SoakSoak ExploitKit Activity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSocialEngineeringOneClickFraud(Generic) Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt gain user data by using social engineering techniques and having unsuspecting visitors redirected to adult sites. Additional Information Attack uses social engineering to fool visitors to adult site. Affected Various
WebAttackSocialEngineeringOneClickFraud2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt gain user data by using social engineering techniques and having unsuspecting visitors redirected to adult sites. Additional Information Attack uses social engineering to fool visitors to adult site. Affected Various
WebAttackSocialEngineeringOneClickFraud3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt gain user data by using social engineering techniques and having unsuspecting visitors redirected to adult sites. Additional Information Attack uses social engineering to fool visitors to adult site. Affected Various
WebAttackSocialEngineeringOneClickFraud4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt gain user data by using social engineering techniques and having unsuspecting visitors redirected to adult sites. Additional Information Attack uses social engineering to fool visitors to adult site. Affected Various
WebAttackSocialEngineeringOneClickFraud5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt gain user data by using social engineering techniques and having unsuspecting visitors redirected to adult sites. Additional Information Attack uses social engineering to fool visitors to adult site. Affected Various
WebAttackSocialEngineeringOneClickFraud6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt gain user data by using social engineering techniques and having unsuspecting visitors redirected to adult sites. Additional Information Attack uses social engineering to fool visitors to adult site. Affected Various
WebAttackSocialEngineeringOneClickFraud7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an attempt gain user data by using social engineering techniques and having unsuspecting visitors redirected to adult sites. Additional Information Attack uses social engineering to fool visitors to adult site. Affected Various
WebAttackSocialEngineeringWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit the user's machine using the Social Engineering Toolkit Additional Information The Social-Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human Affected Various Platforms
WebAttackSocialEngineeringWebsite2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit the user's machine using the Social Engineering Toolkit Additional Information The Social-Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human Affected Various Platforms
WebAttackSofosFOExploitKitWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSofosFOExploitKitWebsite2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
Web Attack: SoftNAS Cloud Command Injection CVE-2018-14417 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a command injection vulnerability in SoftNAS Cloud. Additional Information SoftNAS Cloud is prone to an OS command-injection vulnerability because it fails to properly sanitize user-supplied input submitted to the 'recentVersion' parameter. Specifically, this issue affects the web administration console. An attacker can exploit this issue to execute malicious code in the target server with root privileges. An attacker may exploit this issue to inject and execute arbitrary commands within the context of the affected application; this may aid in further attacks. Affected Versions prior to SoftNAS Cloud 4.0.3 are vulnerable.
Web Attack: SolarWinds Orion API RCE CVE-2020-10148 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution in SolarWinds Orion. Additional Information A vulnerability exists in SolarWinds Orion that can lead to execution of arbitrary code. Affected Various SolarWinds Orion versions. Response
Web Attack: SolarWinds Orion Local File Disclosure CVE-2020-10148 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a local file disclosure vulnerability in SolarWinds Orion. Additional Information SolarWinds Orion is prone to a vulnerability that can be exploited to disclose local files. Affected SolarWinds Orion Platform versions 2019.4 HF 5, 2020.2 with no hotfix installed, and 2020.2 HF 1 are affected. Response
WebAttackSolarWindsOrionPlatformRCECVE-2021-25274 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in SolarWinds Orion Platform. Additional Information Remote unauthenticated clients can send messages to TCP port 1801 that the Collector Service will process which can lead to execute of arbitrary code. Affected SolarWinds Orion Platform before 2020.2.4. Response
WebAttackSolarWindsStorageManagerSQLInjection Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an SQL Injection Vulnerability in SolarWinds Storage Manager. Additional Information Storage Manager Server is an application for storage virtualization management. The application is prone to a SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data to the 'loginName' field of the 'LoginServlet' page. In order to exploit this issue an attacker must have access to TCP port 9000. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Storage Manager Server 5.1.2 is vulnerable; other versions may also be affected. Affected Storage Manager Server 5.1.2 is vulnerable; other versions may also be affected.
WebAttackSolarWindsStorageManagerSQLInjection2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects an SQL Injection Vulnerability in SolarWinds Storage Manager. Additional Information Storage Manager Server is an application for storage virtualization management. The application is prone to a SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data to the 'loginName' field of the 'LoginServlet' page. In order to exploit this issue an attacker must have access to TCP port 9000. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Storage Manager Server 5.1.2 is vulnerable; other versions may also be affected. Affected Storage Manager Server 5.1.2 is vulnerable; other versions may also be affected.
Web Attack: Sonatype Nexus Repository Manager RCE CVE-2019-7238 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Sonatype Nexus Repository Manager. Additional Information Nexus is a repository manager that allows you to proxy, collect, and manage dependencies. Sonatype Nexus Repository Manager is prone to a remote code execution vulnerability due to insufficient access controls in the repository manager. Specifically, this issue exists in the 'previewAssets()' function of Content Selector Expression Language expression because it fails to sanitize the inputs submitted to the expression. An attacker can exploit this issue to execute arbitrary code on the affected system. Affected Nexus Repository Manager versions 3.6.2 OSS/Pro through 3.14.0 are vulnerable.