text
stringlengths 0
383k
|
---|
WebAttackSafariApplescriptExecCVE-2015-7007
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Signature detects attempts to exploit applescript editor to execute arbitrary code. Successfully exploits will lead to victim machine compromised.
Additional Information
Signature detects attempts to exploit applescript editor to execute arbitrary code. Successfully exploits will lead to victim machine compromised.
Affected
Mac OS X before 10.11.1
|
WebAttackSafariCVE-2017-2316
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
An attacker can exploit this issue to cause arbitrary file execution and arbitrary file read.
Additional Information
HelpViewer's WebView has an inside protocol handler "x-help-script" that could be used to open an arbitrary local file. Therefore if we can run arbitrary Javascript code, we'll win easily and, of course, we can read an arbitrary local file with a XMLHttpRequest.
HelpViewer checks whether the path of the url is in a valid help file or not. But we can bypass this with a double encoded "../".
Affected
Multiple version of safari.
Response
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at:[email protected].
|
WebAttackSakuraExecutableDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Browsers
|
WebAttackSakuraExploitKitJarDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Browsers
|
WebAttackSakuraExploitKitWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Browsers
|
WebAttackSakuraExploitKitWebsite4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Browsers
|
WebAttackSakuraExploitKitWebsite5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Browsers
|
WebAttackSakuraExploitKitWebsite6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Browsers
|
WebAttackSakuraExploitKitWebsite7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Browsers
|
Web Attack: Sakura Exploit Kit Website 8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Sakura toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Sakura Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Browsers
|
WebAttackSakuraExploitToolkitWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSakuraExploitToolkitWebsite2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSakuraExploitToolkitWebsite3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSalesLogixServerSQLInjectionVulnerability
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a SQL injection vulnerability in the SalesLogix server.
Additional Information
Best Software SalesLogix is a client-server application designed to facilitate communication between a corporation and its customers. It is commercially available for the Microsoft Windows platform.
The issue is an SQL injection vulnerability. Apparently, it is possible to inject SQL syntax into queries by sending malicious SQL through the 'id' parameter of the 'view' script of the 'slxweb.dll' library. This may facilitate corruption or disclosure of sensitive data, including authentication credentials.
Affected
Best Software SalesLogix
SalesLogix Corporation SalesLogix 2000.0
Response
Updates have been released that resolve these issues. These updates are reportedly available to registered customers through the vendor's support portal. See the referenced support page for more information.
|
WebAttackSaltStackArbitraryDirectoryAccessCVE-2020-11652
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit vulnerability on the affected machine.
Additional Information
The Salt-master process is prone to a vulnerability that allows arbitrary directory access to authenticated users.
Affected
SaltStack Salt before 2019.2.4 and 3000 before 3000.2.
Response
|
Web Attack: SaltStack RCE CVE-2021-25281
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in SaltStack.
Additional Information
A vulnerability exists in SaltStack that can lead to execution of arbitrary code.
Affected
SaltStack Salt before 3002.5.
Response
|
Web Attack: SaltStack Remote Code Execution CVE-2020-16846
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempts to exploit a shell injection vulnerability in SaltStack.
Additional Information
A shell injection vulnerability exists in SaltStack where an unauthenticated user with network access to the Salt API can use shell injections to run code using the SSH client.
Affected
SaltStack Salt through 3002.
Response
|
WebAttackSaltStackSecurityByPassCVE-2020-11651
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit security bypass s vulnerability in SaltStack Salt.
Additional Information
Salt is a central system and configuration manager.
Salt is prone to the following multiple remote security-bypass vulnerabilities:
1. A security-bypass vulnerability. Specifically, the issue occurs because the 'salt-master' process 'ClearFuncs' class does not properly validate method calls. An attacker can exploit this issue to access some methods without authentication. This may used to retrieve user tokens from the salt master and run arbitrary commands on salt minions. [CVE-2020-11651]
2. A security-bypass vulnerability. Specifically, the issue affects the 'salt-master' process of the 'ClearFuncs' class.This may allows access to some methods that improperly sanitize paths and arbitrary directory access to authenticated users. [CVE-2020-11652]
Successfully exploiting these issues will allow attackers to bypass security restrictions and perform unauthorized actions; this may aid in launching further attacks.
Affected
SaltStack Salt before 2019.2.4 and 3000 before 3000.2
Response
Updates are available. Please see the references or vendor advisory for more information.
|
WebAttackSaltStackSecurityByPassCVE-2020-11652
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit security bypass s vulnerability in SaltStack Salt.
Additional Information
Salt is a central system and configuration manager.
Salt is prone to the following multiple remote security-bypass vulnerabilities:
1. A security-bypass vulnerability. Specifically, the issue occurs because the 'salt-master' process 'ClearFuncs' class does not properly validate method calls. An attacker can exploit this issue to access some methods without authentication. This may used to retrieve user tokens from the salt master and run arbitrary commands on salt minions. [CVE-2020-11651]
2. A security-bypass vulnerability. Specifically, the issue affects the 'salt-master' process of the 'ClearFuncs' class.This may allows access to some methods that improperly sanitize paths and arbitrary directory access to authenticated users. [CVE-2020-11652]
Successfully exploiting these issues will allow attackers to bypass security restrictions and perform unauthorized actions; this may aid in launching further attacks.
Affected
SaltStack Salt before 2019.2.4 and 3000 before 3000.2
Response
Updates are available. Please see the references or vendor advisory for more information.
|
WebAttackSamsungNET-iwareCVE-2012-4333
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a buffer overflow vulnerability in Samsung NET-i ware which could result in a denial of service or remote code execution.
Additional Information
Samsung NET-i ware is prone to multiple buffer overflow conditions related to the BackUpToAvi ActiveX Control.
The issue is triggered when parsing an overly long string in the 'BackUpToAvi' property resulting in a heap-based buffer overflow.
Affected
Samsung NET-i ware 1.37 and prior are vulnerable; other versions may also be affected.
|
WebAttackSamsungSecurityManagerRCE
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to execute arbitrary code on the server with SYSTEM privileges. Failed exploit attempts will likely result in denial-of-service conditions.
Additional Information
Samsung Security Manager is prone to multiple remote code-execution vulnerabilities due to an error in the 'PUT' and 'MOVE' methods. Specifically, these issues affect the 'ActiveMQ' broker service. An attacker can exploit these issues by sending specially crafted HTTP 'PUT' request and an HTTP 'MOVE' request.
Affected
Versions prior to Samsung Security Manager 1.31.
|
Web Attack: Sangoma FreePBX Auth Bypass CVE-2019-19006
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit an authentication bypass vulnerability in Sangoma FreePBX.
Additional Information
A vulnerability exists in Sangoma FreePBX that can lead to authentication bypass.
Affected
Sangoma FreePBX 115.0.16.26 and below, 14.0.13.11 and below, 13.0.197.13 and below.
Response
|
WebAttackSAPCrystalReportsCVE-2010-2590
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a buffer overflow vulnerability in SAP Crystal Reports which may result in remote code execution.
Additional Information
SAP Crystal Reports Print ActiveX control is a component that allows users to view crystal reports.
SAP Crystal Reports is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The vulnerability affects the 'ServerResourceVersion' property of the 'CrystalReports12.CrystalPrintControl.1' ActiveX control ('PrintControl.dll'). The ActiveX control is identified by CLSID: 88DD90B6-C770-4CFF-B7A4-3AFD16BB8824.
An attacker can exploit this issue by enticing an unsuspecting user to view a malicious HTML page.
Successful exploits allow remote attackers to execute arbitrary code in the context of the application (typically Internet Explorer) using the ActiveX control. Failed exploit attempts will likely result in denial-of-service conditions.
Affected
SAP Crystal Reports 2008
|
WebAttackSAPCrystalReportsCVE-2010-25902
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a buffer overflow vulnerability in SAP Crystal Reports which may result in remote code execution.
Additional Information
SAP Crystal Reports Print ActiveX control is a component that allows users to view crystal reports.
SAP Crystal Reports is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The vulnerability affects the 'ServerResourceVersion' property of the 'CrystalReports12.CrystalPrintControl.1' ActiveX control ('PrintControl.dll'). The ActiveX control is identified by CLSID: 88DD90B6-C770-4CFF-B7A4-3AFD16BB8824.
An attacker can exploit this issue by enticing an unsuspecting user to view a malicious HTML page.
Successful exploits allow remote attackers to execute arbitrary code in the context of the application (typically Internet Explorer) using the ActiveX control. Failed exploit attempts will likely result in denial-of-service conditions.
Affected
SAP Crystal Reports 2008
|
WebAttackSAPCrystalReportsCVE-2010-25903
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt to exploit a buffer overflow vulnerability in SAP Crystal Reports which may result in remote code execution.
Additional Information
SAP Crystal Reports Print ActiveX control is a component that allows users to view crystal reports.
SAP Crystal Reports is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The vulnerability affects the 'ServerResourceVersion' property of the 'CrystalReports12.CrystalPrintControl.1' ActiveX control ('PrintControl.dll'). The ActiveX control is identified by CLSID: 88DD90B6-C770-4CFF-B7A4-3AFD16BB8824.
An attacker can exploit this issue by enticing an unsuspecting user to view a malicious HTML page.
Successful exploits allow remote attackers to execute arbitrary code in the context of the application (typically Internet Explorer) using the ActiveX control. Failed exploit attempts will likely result in denial-of-service conditions.
Affected
SAP Crystal Reports 2008
|
WebAttackSAPManagementConsoleOSEXEC
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detect attempts to exploit a remote code execution vulnerability in SAP Management Console
Additional Information
SAP Management Console provides a common framework for centralized system management.
SAP Management Console is prone to a remote code-execution vulnerability. This issue affects the SOAP interface when handling a malicious 'OSExecute' payload. In order to exploit this issue an attacker must have access to a valid username and password.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Successful exploits will compromise the affected application and possibly the underlying computer. Failed exploit attempts will result in a denial-of-service condition.
This BID is being retired. The issue described is a feature of the application requiring administrative access. No privileges are gained.
Affected
SAP Management Console
Response
Currently, we are not aware of any vendor supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
|
Web Attack: SAP NetWeaver Arbitrary File Upload CVE-2021-38163
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit an arbitrary file upload vulnerability in SAP Netweaver
Additional Information
A vulnerability exists in SAP Netweaver that can lead to arbitrary file upload later resulting in arbitrary code execution.
Affected
SAP NetWeaver (Visual Composer 7.0 RT) versions - 7.30, 7.31, 7.40, 7.50.
Response
|
Web Attack: SAP NetWeaver Server CVE-2020-6287
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempts to exploit an authentication bypass vulnerability in SAP NetWeaver Application.
Additional Information
A critical vulnerability exists in SAP NetWeaver Java application server that can lead to authentication bypass.
Affected
Versions - 7.30, 7.31, 7.40, 7.50.
Response
|
Web Attack: SAP Remote Code Execution
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability on SAP servers.
Additional Information
Insecurely configured SAP machines can be compromised by attackers to run arbitrary code on the vulnerable SAP servers.
Affected
Various SAP servers.
Response
|
WebAttackSAPSolutionManagerCVE-2020-6207
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit an authentication bypass vulnerability in SAP Solution Manager.
Additional Information
SAP Solution Manager is prone to a vulnerability that can lead to authentication bypass.
Affected
SAP Solution Manager - version 7.2.
Response
|
Web Attack: Sar2HTML 3.2.1 Remote Command Execution
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to execute remote command injection with the privileges of the user running the affected application.
Additional Information
The index.php script in Sar2HTML 3.2.1 is vulnerable to remote command execution.The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when handling a crafted HTTP request. A remote attacker may be able to exploit this to execute arbitrary commands within the context of the application, via a crafted HTTP request.
Affected
Sar2HTML 3.2.1
Response
Currently we are unaware of any vendor supplied patch or updates available for this issue.
|
WebAttackScanbotScannerRequest
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Masscan scans on the machine.
Additional Information
Masscan is a scanning tool that scans and alerts on vulnerabilities found on remote machines.
Affected
Various Platforms.
Response
|
WebAttackScanBoxWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSchneiderElectricOFSCVE-2014-0774
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts of leveraging a stack buffer overflow in Schneider Electric OPC Factory Server (OSF) which could lead to arbitrary code execution.
Additional Information
Schneider Electric products provide solutions to energy management.
Schneider Electric OPC Factory Server (OSF) is prone to a local stack-based buffer-overflow vulnerability because they fail to properly bounds-check user-supplied data. Specifically, this issue occurs while parsing the malformed configuration file. This issue can be exploited to gain privileges through vectors involving a malformed configuration file.
Attackers can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition.
Affected
TLXCDSUOFS33 v3.35
TLXCDSTOFS33 v3.35
TLXCDLUOFS33 v3.35
TLXCDLTOFS33 v3.35
TLXCDLFOFS33 v3.35
|
WebAttackSchneiderElectricProductsCVE-2019-6814SecurityBypass
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Security Bypass vulnerability on the affected machine.
Additional Information
Schneider Electric Pelco Endura NET55XX Encoder is vulnerable to Security Bypass attack. Successfully exploiting these issues will allow attackers to change the SSH service and change the root password within the context of the application.
Affected
Schneider Electric Pelco Endura NET55XX Encoder prior to version 2.1.9.7
Response
|
WebAttackSchneiderElectricU.MotionBuilderRCECVE-2018-7841
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Schneider Electric U.Motion Builder.
Additional Information
A vulnerability exists in Schneider Electric U.Motion Builder that can lead to execution of arbitrary code.
Affected
Schneider Electric U.motion Builder software versions prior to v1.3.4.
Response
|
Web Attack: SCO Skunkware ViewSrc Directory Traversal CVE-1999-0174
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects attempts to access the View Source CGI program through HTTP.
Additional Information
view-source is a script included with the httpd package bundled with Skunkware 2.0. Skunkware 2.0 is a variant of the UNIX Operating System distributed by Santa Cruz Operations.
A problem in the handling of slashes and dots when appended to the view-source script could allow access to restricted files remotely. By appending a series of double-dots and slashes to a query using the view-source script, it is possible to traverse the directory structure on a web server. This allows you to view the contents of directories, and files that are readable by the UID of the httpd process, and makes it possible for a user with malicious motives to read files on a remote system and gather intelligence for an attack against the system, as well as other potentially sensitive information.
Affected
SCO Skunkware 2.0
Response
Upgrade to SCO Skunkware 2000 or newer:
http://www.sco.com/skunkware/
|
WebAttackSeaCMSAuthenticatedPHPCodeExecutionCVE-2017-17561
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit PHP code execution vulnerability on the affected machine.
Additional Information
SeaCMSis vulnerable to authenticated PHP Code Execution attack. Successfully exploiting these issues will allow low privileged attackers to execute arbitrary code within the context of the application.
Affected
SeaCMS 6.56
Response
|
WebAttackSeaCMSPHPCodeExecution
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit PHP code execution vulnerability on the affected machine.
Additional Information
Multiple version of SeaCMS are vulnerable to PHP remote code execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
Various SeaCMS.
Response
|
Web Attack: Seeyon Office HTML Servlet Arbitrary File Upload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit an arbitrary file upload vulnerability in Seeyon Office HTML servlet.
Additional Information
An arbitrary file upload vulnerability exists in Seeyon Office HTML servlet that can lead to execution of abitrary code.
Affected
Various Platforms.
Response
|
WebAttackSeosploitMaliciousExploitKitRequest
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
WebAttackSeosploitRequest
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempt to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
This signature detect attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Affected
Various
Response
Update all vendor patches to the latest versions.
|
Web Attack: Seowon SlC 130 Router CVE-2020-17456
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Remote Code Execution vulnerability on the affected machine.
Additional Information
Seowon SlC 130 Router is vulnerable to Remote Code Execution attack. User can run arbitrary commands on the router as root. This issue results from the use of hard-coded encryption key. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.
An attacker can exploit this issue to execute arbitrary code within the context of the device. Failed exploit attempts will likely cause a denial-of-service condition.
Affected
Seowon SlC 130 Router.
Response
|
WebAttackSEPMDirectoryTraversal
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit multiple security bypass vulnerability in Symantec Endpoint Protection and Symantec Endpoint Protection Manager.
Additional Information
SEP/SEPM is prone to a multiple vulnerabilities which includes - authentication bypass, arbitrary read/write, SQL injection, path traversal.
Affected
SEP/SEPM
|
Web Attack: SEPM SQL Injection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit multiple security bypass vulnerability in Symantec Endpoint Protection and Symantec Endpoint Protection Manager.
Additional Information
SEP/SEPM is prone to a multiple vulnerabilities which includes - authentication bypass, arbitrary read/write, SQL injection, path traversal.
Affected
SEP/SEPM
|
WebAttackSerenityExploitKit2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Serenity toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Serenity Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Web Browsers
|
WebAttackServUWebClientHttpRequestBO
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This Signature detects attempts to cause buffer overflow in the Serv-U Web Client.
Additional Information
RhinoSoft Serv-U Web Client is a browser-based application for transferring files.
The application is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The issue occurs when handling overly long session cookies.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
Serv-U Web Client 9.0.0.5 is vulnerable; other versions prior to Serv-U Web Client 9.1.0.0 may also be affected.
Affected
RhinoSoft Serv-U Web Client
Response
Updates are available. Please see the references for details.
|
Web Attack: SGI InfoSearch fname Exec CVE-2000-0207
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to execute the infosrch CGI script that allows remote commands to be executed with the web server's privileges.
Additional Information
The InfoSearch package converts man pages and other documentation into HTML web content. The search form uses infosrch.cgi which does not properly parse user input in the 'fname' variable, allowing commands to be executed at the webserver privilege level by remote web users.
Affected
SGI InfoSearch 1.0
SGI IRIX 6.5, 6.5.1, 6.5.2 m, 6.5.3, 6.5.3 f, 6.5.3 m, 6.5.4, 6.5.6, 6.5.7
Response
From the SGI Advisory (attached in full in the 'Credit' section):
Although patches are available for this issue, it is realized that there may be situations where installing the patches immediately maynnot be possible.
The steps below can be used to disable the infosrch.cgi(1) program tonprevent exploitation of this vulnerability until patches can be installed.
1) Become the root user on the system.
% /bin/su -n Password:
#
2) Change the permissions on the infosrch.cgi(1) program.
=================
**** WARNING ****
=================
Removing the permissions from the infosrch.cgi(1) program will prevent non-root users from using the Infosearch subsystem through the HTTP web server.
# /bin/chmod 500 /usr/lib/infosearch/bin/infosrch.cgi
3) Return to previous level.
# exit
%
---
For another workaround, see "Re: Vulnerability in infosrch.cgi" in Credit.
SGI IRIX 6.5:
SGI Patch Infosrch.cgi Patchset
SGI Upgrade Maintenance Releases
SGI Patch 4060
SGI Patch 4381
SGI Upgrade IRIX 6.5.14 Maintenance Release
SGI Patch 4416
SGI Patch 4574
SGI Upgrade IRIX 6.5.18
SGI Patch 4799
SGI Upgrade IRIX 6.5.19
SGI Upgrade Java SDK 1.4.1
SGI Upgrade Runtime Plug-in for IRIX, Java 1.4.1
SGI Patch patch4915.tar
SGI Patch websetup.tardist
SGI IRIX 6.5.3:
SGI Patch Infosrch.cgi Patchset
SGI Upgrade Maintenance Releases
SGI Patch 4060
SGI Upgrade IRIX 6.5.14 Maintenance Release
SGI Patch 4416
SGI Patch 4574
SGI Upgrade IRIX 6.5.18
SGI Patch 4799
SGI Upgrade IRIX 6.5.19
SGI Upgrade Java SDK 1.4.1
SGI Upgrade Runtime Plug-in for IRIX, Java 1.4.1
SGI Patch patch4915.tar
SGI Patch websetup.tardist
SGI IRIX 6.5.4:
SGI Patch Infosrch.cgi Patchset
SGI Upgrade Maintenance Releases
SGI Patch 4060
SGI Upgrade IRIX 6.5.14 Maintenance Release
SGI Patch 4416
SGI Patch 4574
SGI Upgrade IRIX 6.5.18
SGI Patch 4799
SGI Upgrade IRIX 6.5.19
SGI Upgrade Java SDK 1.4.1
SGI Upgrade Runtime Plug-in for IRIX, Java 1.4.1
SGI Patch patch4915.tar
SGI Patch websetup.tardist
SGI IRIX 6.5.3 f:
SGI Patch Infosrch.cgi Patchset
SGI Upgrade Maintenance Releases
SGI Patch 4060
SGI Patch 4382
SGI Patch 4416
SGI Patch 4574
SGI Patch 4799
SGI IRIX 6.5.2 m:
SGI Patch Infosrch.cgi Patchset
SGI Upgrade Maintenance Releases
SGI Patch 4060
SGI Patch 4381
SGI Patch 4416
SGI Patch 4574
SGI Patch 4799
SGI IRIX 6.5.3 m:
SGI Patch Infosrch.cgi Patchset
SGI Upgrade Maintenance Releases
SGI Patch 4060
SGI Patch 4381
SGI Patch 4416
SGI Patch 4574
SGI Patch 4799
SGI IRIX 6.5.1:
SGI Patch Infosrch.cgi Patchset
SGI Upgrade Maintenance Releases
SGI Patch 4060
SGI Patch 4381
SGI Upgrade IRIX 6.5.14 Maintenance Release
SGI Patch 4416
SGI Patch 4574
SGI Upgrade IRIX 6.5.18
SGI Patch 4799
SGI Upgrade IRIX 6.5.19
SGI Upgrade Java SDK 1.4.1
SGI Upgrade Runtime Plug-in for IRIX, Java 1.4.1
SGI Patch patch4915.tar
SGI Patch websetup.tardist
SGI IRIX 6.5.6:
SGI Patch Infosrch.cgi Patchset
SGI Upgrade Maintenance Releases
SGI Upgrade IRIX 6.5.14 Maintenance Release
SGI Patch 4416
SGI Patch 4574
SGI Upgrade IRIX 6.5.18
SGI Patch 4799
SGI Upgrade IRIX 6.5.19
SGI Upgrade Java SDK 1.4.1
SGI Upgrade Runtime Plug-in for IRIX, Java 1.4.1
SGI Patch patch4915.tar
SGI Patch websetup.tardist
SGI IRIX 6.5.7:
SGI Patch Infosrch.cgi Patchset
SGI Patch 4060
SGI Patch patch4123
SGI Upgrade IRIX 6.5.14 Maintenance Release
SGI Patch 4416
SGI Patch 4574
SGI Upgrade IRIX 6.5.18
SGI Patch 4799
SGI Upgrade IRIX 6.5.19
SGI Upgrade Java SDK 1.4.1
SGI Upgrade Runtime Plug-in for IRIX, Java 1.4.1
SGI Patch patch4915.tar
SGI Patch websetup.tardist
|
WebAttackShadowStreamRecorderASXFileBO
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a buffer overflow vulnerability in Mini-stream Software products which could result in remote code execution.
Additional Information
Mini-stream Software provides multimedia applications for Microsoft Windows platforms.
Multiple Mini-stream Software products are prone to a remote stack-based buffer-overflow vulnerability because they fail to perform adequate checks on user-supplied input. The vulnerability occurs when handling '.asx' files. Specifically, the application fails to check the length of the 'href' parameter of the 'ref' tag.
Successfully exploiting this issue may allow remote attackers to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.
Affected
This issue affect the following products:
RM-MP3 Converter 3.0.0.7
Ripper 3.0.1.1
ASX to MP3 Converter 3.0.0.7
|
WebAttackSharePointXSSCVE-2011-1893
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a XSS vulnerability in Microsoft SharePoint.
Additional Information
There exists a XSS vulnerability in Microsoft SharePoint which results in an elevation of privilege.
Affected
NA
Response
NA
|
WebAttackSharpshooterWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious payload activity served by SharpShooter.
Additional Information
SharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source code.
Affected
N/A
Response
|
WebAttackShellcodeDownloadActivity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download various shellcodes, which can used to perform various harmful activities on user's system.
Additional Information
An attacker can use various shellcode to execute arbitrary code with the privileges of the user running the application.
Affected
Various platforms
|
WebAttackShellcodeDownloadActivity2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download various shellcodes, which can used to perform various harmful activities on user's system.
Additional Information
An attacker can use various shellcode to execute arbitrary code with the privileges of the user running the application.
Affected
Various platforms
|
WebAttackShellcodeDownloadActivity4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download various shellcodes, which can used to perform various harmful activities on user's system.
Additional Information
An attacker can use various shellcode to execute arbitrary code with the privileges of the user running the application.
Affected
Various platforms
|
WebAttackShellcodeDownloadActivity5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to download various shellcodes, which can used to perform various harmful activities on user's system.
Additional Information
An attacker can use various shellcode to execute arbitrary code with the privileges of the user running the application.
Affected
Various platforms
|
Web Attack: Shenzhen TVT DVR Remote Code Execution
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit a remote code execution vulnerability in Shenzhen TVT DVR.
Additional Information
Shenzhen TVT DVR is affected by a vulnerability that can be exploited to run arbitrary commands leading to remote code execution.
Affected
Shenzhen TVT DVR.
Response
|
WebAttackSiberiaToolkitActivity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Siberia Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Additional Information
Siberia Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Platforms
Response
NA
|
WebAttackSiberiaToolkitDownloadAttack2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Siberia Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Additional Information
Siberia Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Platforms
Response
NA
|
WebAttackSibhostExploitKitRedirect
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Sibhost toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Sibhost Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Web Browsers
|
WebAttackSibhostExploitKitWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Sibhost toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Sibhost Toolkit compromises the machine by targeting various vendor vulnerabilities on the victim's machine.
Affected
Various Web Browsers
|
WebAttackSibhostJARFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSibhostSWFFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSickbeardRemoteCommandInjection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a command injection vulnerability in Sickbeard 0.1
Additional Information
Sickbeard 0.1 is prone to a vulnerability that can lead to execution of arbitrary commands.
Affected
Sickbeard 0.1
Response
|
WebAttackSiemensSIMATICWinCCCVE-2013-0674
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a vulnerability in Siemens SIMATIC WinCC SCADA which may result in remote code execution.
Additional Information
Siemens SIMATIC WinCC And PCS 7 are prone to the following security vulnerabilities:
1. An information-disclosure vulnerability occurs because application fails to properly restrict user access to the embedded MS SQL database. Specifically, this issue occurs because the WinCC stores user passwords for WebNavigator in an MS SQL database. Attackers can exploit this issue to gain knowledge of otherwise restricted password fields. CVE-2013-0678
2. An information-disclosure vulnerability occurs because application provides too many rights to several users in the database. Attackers can exploit this issue to gain knowledge of password fields. CVE-2013-0676
3. A directory-traversal vulnerability occurs because it returns sensitive data if certain file names and paths are queried. This issue can be exploited by sending a specially crafted URI request containing directory-traversal sequences. CVE-2013-0679
4. A remote buffer-overflow vulnerability occurs in 'RegReader' ActiveX control. Specifically, this issue occurs because it does not properly bounds check the length of the parameters. due to an unspecified error in the CVE-2013-0674
5. An information-disclosure vulnerability occurs because it allows parsing of project files insecurely. Attackers can exploit his issue by tricking a user into opening a specially crafted project file. CVE-2013-0677
6. A remote buffer-overflow vulnerability occurs due to an error when handling certain network packets in the WinCC central communications component ('CCEServer'). Attackers can exploit this issue using specially crafted packets. CVE-2013-0675
Note: Successful exploit of issues #1, #2 and #3 requires authentication.
An attacker can exploit these issues to gain access to sensitive information, arbitrary system files, and execute arbitrary code in the context of the application (typically Internet Explorer) that uses the ActiveX control. Failed exploit attempts will result in a denial-of-service conditions.
Affected
Versions prior to Siemens SIMATIC WinCC 7.2 and Siemens SIMATIC PCS 7 8.0 SP1 are vulnerable.
|
WebAttackSiemensSIMATICWinCCCVE-2013-06742
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a vulnerability in Siemens SIMATIC WinCC SCADA which may result in remote code execution.
Additional Information
Siemens SIMATIC WinCC And PCS 7 are prone to the following security vulnerabilities:
1. An information-disclosure vulnerability occurs because application fails to properly restrict user access to the embedded MS SQL database. Specifically, this issue occurs because the WinCC stores user passwords for WebNavigator in an MS SQL database. Attackers can exploit this issue to gain knowledge of otherwise restricted password fields. CVE-2013-0678
2. An information-disclosure vulnerability occurs because application provides too many rights to several users in the database. Attackers can exploit this issue to gain knowledge of password fields. CVE-2013-0676
3. A directory-traversal vulnerability occurs because it returns sensitive data if certain file names and paths are queried. This issue can be exploited by sending a specially crafted URI request containing directory-traversal sequences. CVE-2013-0679
4. A remote buffer-overflow vulnerability occurs in 'RegReader' ActiveX control. Specifically, this issue occurs because it does not properly bounds check the length of the parameters. due to an unspecified error in the CVE-2013-0674
5. An information-disclosure vulnerability occurs because it allows parsing of project files insecurely. Attackers can exploit his issue by tricking a user into opening a specially crafted project file. CVE-2013-0677
6. A remote buffer-overflow vulnerability occurs due to an error when handling certain network packets in the WinCC central communications component ('CCEServer'). Attackers can exploit this issue using specially crafted packets. CVE-2013-0675
Note: Successful exploit of issues #1, #2 and #3 requires authentication.
An attacker can exploit these issues to gain access to sensitive information, arbitrary system files, and execute arbitrary code in the context of the application (typically Internet Explorer) that uses the ActiveX control. Failed exploit attempts will result in a denial-of-service conditions.
Affected
Versions prior to Siemens SIMATIC WinCC 7.2 and Siemens SIMATIC PCS 7 8.0 SP1 are vulnerable.
|
WebAttackSiemensSolidEdgeMemoryCorruption
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a memory corruption vulnerability in Siemens Solid Edge which could result in remote code execution.
Additional Information
Siemens Solid Edge SEListCtrlX ActiveX control is prone to a memory corruption vulnerability. Specifically, this issue affects the 'SetItemReadOnly()' function of the 'control.dll' ActiveX control and is triggered when processing a specially crafted input. The ActiveX control is identified by the following CLSID:
5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D
Affected
Siemens Solid Edge
|
WebAttackSiemensSolidEdgeMemoryCorruption2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a memory corruption vulnerability in Siemens Solid Edge which could result in remote code execution.
Additional Information
Siemens Solid Edge SEListCtrlX ActiveX control is prone to a memory corruption vulnerability. Specifically, this issue affects the 'SetItemReadOnly()' function of the 'control.dll' ActiveX control and is triggered when processing a specially crafted input. The ActiveX control is identified by the following CLSID:
5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D
Affected
Siemens Solid Edge
|
WebAttackSiemensSolidEdgeMemoryCorruption3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a memory corruption vulnerability in Siemens Solid Edge which could result in remote code execution.
Additional Information
Siemens Solid Edge SEListCtrlX ActiveX control is prone to a memory corruption vulnerability. Specifically, this issue affects the 'SetItemReadOnly()' function of the 'control.dll' ActiveX control and is triggered when processing a specially crafted input. The ActiveX control is identified by the following CLSID:
5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D
Affected
Siemens Solid Edge
|
WebAttackSiemensSolidEdgeMemoryCorruption4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a memory corruption vulnerability in Siemens Solid Edge which could result in remote code execution.
Additional Information
Siemens Solid Edge SEListCtrlX ActiveX control is prone to a memory corruption vulnerability. Specifically, this issue affects the 'SetItemReadOnly()' function of the 'control.dll' ActiveX control and is triggered when processing a specially crafted input. The ActiveX control is identified by the following CLSID:
5D6A72E6-C12F-4C72-ABF3-32F6B70EBB0D
Affected
Siemens Solid Edge
|
WebAttackSilenceBankingTrojanAttack
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Banking Trojan activity on the compromised computer.
Additional Information
Banking Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Multiple
Response
|
WebAttackSilentSignatureforPathTraversing
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects unclassified Trojan activity on the compromised computer.
Additional Information
Trojans allow the remote attackers to perform various malicious activities on the compromised machine.
Affected
Various platforms
Response
NA
|
WebAttackSkinCrafterActiveXCVE-2012-2271
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Skin Crafter is a software that is used to create custom skins for different windows applications. A buffer overflow vulnerability exists in version 3.0 that can allow remote code execution.
Additional Information
The vulnerability lies in the COM component used by the product SkinCrafter
from DMSoft Technologies(http://www.dmsofttech.com/projects.html). This COM
component, SkinCrafter3_vs2005.dll, implememnts a function InitLicenKeys,
whose parameter is not checked for the bounds, hence leading to the
overflow condition.
Affected
Windows
Response
Upgrade to higher version of Skin Crafter.
|
WebAttackSkypeInformationDisclosureVulnerabilityCVE-2022-26911
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit an arbitrary file read vulnerability in Skype for BusinessB/MS Lync.
Additional Information
Skype for BusinessB/MS Lync is prone to an Arbitrary File Read vulnerability for an internal site that allows Information Disclosure.
Affected
Before Microsoft Lync Server 2013 CU10
Response
|
WebAttackSlackDesktopRemoteCodeExecution
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Remote Code Execution vulnerability on the affected machine.
Additional Information
Slack Desktop is vulnerable to Remote Code Execution attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
Slack for Desktop (Mac/Windows/Linux) prior to version 4.4
Response
|
WebAttackSMTPCredentialsTheftAttempt
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the malicious websites or servers hosting services that attempts to steal user information.
Additional Information
Hackers design websites or servers hosting services that can enable them to steal user related information that can later be used to gain access to their computers.
Affected
Various platforms.
Response
|
WebAttackSMTPCredentialsTheftAttempt_1
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the malicious websites or servers hosting services that attempts to steal user information.
Additional Information
Hackers design websites or servers hosting services that can enable them to steal user related information that can later be used to gain access to their computers.
Affected
Various platforms.
Response
|
Web Attack: SMTP Domino SMTP ENVID BO
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
Remote attackers may exploit this vulnerability to execute arbitrary machine code in the context of the affected service.
Additional Information
The Lotus SMTP Server is part of the integrated solutions offered in Lotus Domino and Notes server software packages. A vulnerability exists in the SMTP server that can allow a malicious user to remotely execute code on the server.
The problem exists in the ENVID variable, as specified in RFC 1891. The SMTP server does not conduct adequate bounds checking on the ENVID keyword of the "MAIL FROM:" field. This makes it possible for a malicious user to custom craft an ENVID that could result in remote execution of code as the UID that the SMTP server is operating as.
In the event of successful overflow, the Notes server will crash, and all Notes services will discontinue functioning, regardless of successful execution of code. The Notes server will then require a manual restart, and additionally may require manual removal of mail.box and/or log.nsf files.
Affected
Lotus Domino Enterprise Server 5.0.1, 5.0.2, 5.0.2 b, 5.0.3, 5.0.4
Lotus Domino Mail Server 5.0.1, 5.0.2, 5.0.2 b, 5.0.3, 5.0.4
Response
S.A.F.E.R recommends that all users of Lotus Packages upgrade to the most recent release, currently 5.05. A link to the Lotus update page follows:
Lotus Domino Enterprise Server 5.0.1:
Lotus Upgrade 5.05
Lotus Domino Enterprise Server 5.0.2:
Lotus Upgrade 5.05
Lotus Domino Enterprise Server 5.0.2 b:
Lotus Upgrade 5.05
Lotus Domino Enterprise Server 5.0.3:
Lotus Upgrade 5.05
Lotus Domino Enterprise Server 5.0.4:
Lotus Upgrade 5.05
Lotus Domino Mail Server 5.0.1:
Lotus Upgrade 5.05
Lotus Domino Mail Server 5.0.2:
Lotus Upgrade 5.05
Lotus Domino Mail Server 5.0.2 b:
Lotus Upgrade 5.05
Lotus Domino Mail Server 5.0.3:
Lotus Upgrade 5.05
Lotus Domino Mail Server 5.0.4:
Lotus Upgrade 5.05
|
WebAttackSMTPEXPNVintraDoS
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
This signature detects a malformed command sent to the Vintra Mail Server
Additional Information
Older versions of the Vintra SMTP MailServer allow remote attackers to cause a denial of service via a malformed "EXPN *@" command.
Affected
Vintra Mail Server
Response
Upgrade to a new version of Vintra Mail Server Professional
|
Web Attack: SnakeYAML Library CVE-2022-1471
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Unsafe Deserialization vulnerability on the affected machine.
Additional Information
SnakeYAML library is vulnerable to Unsafe Deserialization attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
SnakeYAML library up to (excluding) version 2.0
Response
|
Web Attack: SnakeYAML Library CVE-2022-1471 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Unsafe Deserialization vulnerability on the affected machine.
Additional Information
SnakeYAML library is vulnerable to Unsafe Deserialization attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
SnakeYAML library up to (excluding) version 2.0
Response
|
WebAttackSoakSoakExploitActivity2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Web Attack: SoakSoak ExploitKit Activity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSocialEngineeringOneClickFraud(Generic)
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt gain user data by using social engineering techniques and having unsuspecting visitors redirected to adult sites.
Additional Information
Attack uses social engineering to fool visitors to adult site.
Affected
Various
|
WebAttackSocialEngineeringOneClickFraud2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt gain user data by using social engineering techniques and having unsuspecting visitors redirected to adult sites.
Additional Information
Attack uses social engineering to fool visitors to adult site.
Affected
Various
|
WebAttackSocialEngineeringOneClickFraud3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt gain user data by using social engineering techniques and having unsuspecting visitors redirected to adult sites.
Additional Information
Attack uses social engineering to fool visitors to adult site.
Affected
Various
|
WebAttackSocialEngineeringOneClickFraud4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt gain user data by using social engineering techniques and having unsuspecting visitors redirected to adult sites.
Additional Information
Attack uses social engineering to fool visitors to adult site.
Affected
Various
|
WebAttackSocialEngineeringOneClickFraud5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt gain user data by using social engineering techniques and having unsuspecting visitors redirected to adult sites.
Additional Information
Attack uses social engineering to fool visitors to adult site.
Affected
Various
|
WebAttackSocialEngineeringOneClickFraud6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt gain user data by using social engineering techniques and having unsuspecting visitors redirected to adult sites.
Additional Information
Attack uses social engineering to fool visitors to adult site.
Affected
Various
|
WebAttackSocialEngineeringOneClickFraud7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an attempt gain user data by using social engineering techniques and having unsuspecting visitors redirected to adult sites.
Additional Information
Attack uses social engineering to fool visitors to adult site.
Affected
Various
|
WebAttackSocialEngineeringWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit the user's machine using the Social Engineering Toolkit
Additional Information
The Social-Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human
Affected
Various Platforms
|
WebAttackSocialEngineeringWebsite2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit the user's machine using the Social Engineering Toolkit
Additional Information
The Social-Engineering Toolkit (SET) is a python-driven suite of custom tools which solely focuses on attacking the human
Affected
Various Platforms
|
WebAttackSofosFOExploitKitWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSofosFOExploitKitWebsite2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Web Attack: SoftNAS Cloud Command Injection CVE-2018-14417
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a command injection vulnerability in SoftNAS Cloud.
Additional Information
SoftNAS Cloud is prone to an OS command-injection vulnerability because it fails to properly sanitize user-supplied input submitted to the 'recentVersion' parameter. Specifically, this issue affects the web administration console. An attacker can exploit this issue to execute malicious code in the target server with root privileges.
An attacker may exploit this issue to inject and execute arbitrary commands within the context of the affected application; this may aid in further attacks.
Affected
Versions prior to SoftNAS Cloud 4.0.3 are vulnerable.
|
Web Attack: SolarWinds Orion API RCE CVE-2020-10148
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution in SolarWinds Orion.
Additional Information
A vulnerability exists in SolarWinds Orion that can lead to execution of arbitrary code.
Affected
Various SolarWinds Orion versions.
Response
|
Web Attack: SolarWinds Orion Local File Disclosure CVE-2020-10148
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a local file disclosure vulnerability in SolarWinds Orion.
Additional Information
SolarWinds Orion is prone to a vulnerability that can be exploited to disclose local files.
Affected
SolarWinds Orion Platform versions 2019.4 HF 5, 2020.2 with no hotfix installed, and 2020.2 HF 1 are affected.
Response
|
WebAttackSolarWindsOrionPlatformRCECVE-2021-25274
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in SolarWinds Orion Platform.
Additional Information
Remote unauthenticated clients can send messages to TCP port 1801 that the Collector Service will process which can lead to execute of arbitrary code.
Affected
SolarWinds Orion Platform before 2020.2.4.
Response
|
WebAttackSolarWindsStorageManagerSQLInjection
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an SQL Injection Vulnerability in SolarWinds Storage Manager.
Additional Information
Storage Manager Server is an application for storage virtualization management.
The application is prone to a SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data to the 'loginName' field of the 'LoginServlet' page. In order to exploit this issue an attacker must have access to TCP port 9000.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Storage Manager Server 5.1.2 is vulnerable; other versions may also be affected.
Affected
Storage Manager Server 5.1.2 is vulnerable; other versions may also be affected.
|
WebAttackSolarWindsStorageManagerSQLInjection2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects an SQL Injection Vulnerability in SolarWinds Storage Manager.
Additional Information
Storage Manager Server is an application for storage virtualization management.
The application is prone to a SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data to the 'loginName' field of the 'LoginServlet' page. In order to exploit this issue an attacker must have access to TCP port 9000.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Storage Manager Server 5.1.2 is vulnerable; other versions may also be affected.
Affected
Storage Manager Server 5.1.2 is vulnerable; other versions may also be affected.
|
Web Attack: Sonatype Nexus Repository Manager RCE CVE-2019-7238
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Sonatype Nexus Repository Manager.
Additional Information
Nexus is a repository manager that allows you to proxy, collect, and manage dependencies.
Sonatype Nexus Repository Manager is prone to a remote code execution vulnerability due to insufficient access controls in the repository manager. Specifically, this issue exists in the 'previewAssets()' function of Content Selector Expression Language expression because it fails to sanitize the inputs submitted to the expression.
An attacker can exploit this issue to execute arbitrary code on the affected system.
Affected
Nexus Repository Manager versions 3.6.2 OSS/Pro through 3.14.0 are vulnerable.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.