text
stringlengths
0
383k
Web Attack: Sonatype Nexus Repository RCE CVE-2020-10199 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempts to exploit a remote code execution vulnerability in Sonatype Nexus Repository. Additional Information A vulnerability exists in Sonatype Nexus Repository that can lead to execution of remote code. Affected Versions before 3.21.2. Response
WebAttackSonatypeNexusRepositoryRCECVE-2020-10204 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempts to exploit a remote code execution vulnerability in Sonatype Nexus Repository. Additional Information A vulnerability exists in Sonatype Nexus Repository that can lead to execution of remote code. Affected Versions before 3.21.2. Response
Web Attack: Sonicwall Email Security CVE-2021-20023 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a directory traversal vulnerability in SonicWall Email Security. Additional Information A vulnerability exists in SonicWall Email Security that can lead to arbitrary file read. Affected SonicWall Email Security version 10.0.9.x. Response
WebAttackSonicWallGlobalMgmtSystemXMLRPCRCE Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in SonicWall Global Management system. Additional Information An vulnerability exists in SonicWall Global Management System's XMLRPC implementation that can lead to execution of unauthorized code on the vulnerable systems. Affected Versions 8.1 Build 8110.1197 and below Response
Web Attack: Sophos Firewall CVE-2022-1040 Scanning Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Authentication Bypass vulnerability on the affected machine. Additional Information Sophos Firewall is vulnerable to Authentication Bypass attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected Sophos Firewall version v18.5 MR3 and older. Response
Web Attack: Sophos Web Appliance Command Injection CVE-2023-1671 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a command injection vulnerability in Sophos Web Appliance older than version 4.3.10.4. Additional Information A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code. Affected Sophos Web Appliance older than version 4.3.10.4. Response
WebAttackSophosXGFirewallCVE-2020-15504 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit SQL Injection vulnerability on the affected machine. Additional Information Sophos XG Firewall is prone to an SQL-injection vulnerability in the user and admin web interfaces of Sophos XG Firewall v18.0 MR1 and older, potentially allows an attacker to run arbitrary code remotely Affected Sophos XG Firewall prior to version v18.0 MR1 Response
Web Attack: Sourcecodester System CVE-2020-29227 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Local File Include vulnerability on the affected machine. Additional Information Sourcecodester's Car Rental Management System is vulnerable to Local File Include attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected An issue was discovered in Car Rental Management System 1.0 Response
WebAttackSpamCampaigndomains Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackSpamCampaigndomains12 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackSpamCampaigndomains13 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackSpamCampaigndomains14 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackSpamCampaigndomains2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackSpamCampaigndomains3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackSpamCampaigndomains4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackSpamCampaigndomains5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackSpamCampaigndomains6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackSpamCampaigndomains7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackSpamCampaigndomains8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackSpamCampaigndomains9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackSpamMaliciousJSDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the websites associated with the spam campaign. Additional Information This signature detects the websites associated with the spam campaign. Affected All browsers
WebAttackSpartanExploitKitFlashExploit Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits and payloads from Spartan exploit kit that may compromise a computer through various vendor vulnerabilities. Additional Information Spartan is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various Windows platform
WebAttackSpartanExploitKitWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits and payloads from Spartan exploit kit that may compromise a computer through various vendor vulnerabilities. Additional Information Spartan is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various Windows platform
Web Attack: Spelevo Exploit Kit Website Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
Web Attack: Spelevo Exploit Kit Website 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
Web Attack: Splunk RCE CVE-2023-46214 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Splunk. Additional Information Splunk is prone to a vulnerability that can lead to execution of remote code. Affected Splunk Enterprise versions below 9.0.7 and 9.1.2. Response
Web Attack: Spring Boot Actuator Directory Traversal CVE-2021-21234 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Directory Traversal vulnerability in Spring Boot Actuator Logview. Additional Information In spring-boot-actuator-logview before version 0.2.13 there is a directory traversal vulnerability. The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal exploits (so that filename..somefile would not work), the base folder parameter was not sufficiently checked, so that filename=somefile and base.. could access a file outside the logging base directory). spring-boot-actuator-logview in a library that adds a simple logfile viewer as spring boot actuator endpoint. Affected Spring Boot Actuator Logview before version 0.2.13 Response
Web Attack: Spring Boot Remote Code Execution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempts to exploit a remote code execution vulnerability in Spring Boot. Additional Information A vulnerability exists in Spring Boot that can lead to execution of remote code. Affected Spring Boot. Response
Web Attack: Spring Cloud Gateway Code Injection CVE-2022-22947 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Spring Cloud Gateway. Additional Information A vulnerability exists in Spring Cloud Gateway that can lead to execution of arbitrary code. Affected Spring Cloud Gversions prior to 3.1.1+ and 3.0.7+. Response
Web Attack: Spring Clouds Config Directory Traversal CVE-2019-3799 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a directory traversal vulnerability in Spring Clouds Config. Additional Information A directory traversal vulnerability exists in Spring Cloud Config that can lead to applications obtaining arbitrary configuration files. Affected Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6. Response
Web Attack: Spring Data Commons CVE-2018-1273 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Spring Data Commons. Additional Information A remote code execution vulnerability exists in Spring Data REST backed HTTP resources which can lead to execution of arbitrary code. Affected Versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5. Response
Web Attack: Spring Framework CVE-2022-22965 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Spring4Shell Remote Code Execution vulnerability on the affected machine. Additional Information Spring Framework is vulnerable to Spring4Shell attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected Various Operating Systems Response
Web Attack: Spring Framework CVE-2022-22965 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Spring4Shell Remote Code Execution vulnerability on the affected machine. Additional Information Spring Framework is vulnerable to Spring4Shell attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected Various Operating Systems Response
Web Attack: Spring Framework CVE-2022-22965 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to exploit Spring4Shell Remote Code Execution vulnerability on the affected machine. Additional Information Spring Framework is vulnerable to Spring4Shell attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application. Affected Various Operating Systems Response
Web Attack: Spring MVC Directory Traversal Vulnerability CVE-2018-1271 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description A Directory Traversal vulnerability in Spring MVC, Spring Framework versions 5.0 to 5.0.4, 4.3 to 4.3.14, and older unsupported versions which could help a malicious user to send a request using a specially crafted URL that can lead a directory traversal attack. Additional Information Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack. Affected Spring Framework versions 5.0 to 5.0.4, 4.3 to 4.3.14, and older unsupported versions Response Update to latest available version
WebAttackSpyEyeWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects trojan.spyeye activity. Additional Information Trojan.Spyeye is a Trojan horse that may steal information from the compromised computer by installing a backdoor.
WebattackSqlInjection Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description Multiple AJ Square products are prone to SQL-injection vulnerabilities. Additional Information AJ Square producsts (AJ Dating, AJ Auction, AJ Classifieds, and AJ Forum) are web-based applications implemented in PHP. The applications are prone to SQL-injection vulnerabilities because they fail to properly sanitize user-supplied input before using it in SQL queries. Specifically, these issues affect the following scripts and parameters: AJ Dating: 'user_id of 'view_profile.php' AJ Auction: 'cate_id' of 'subcat.php' AJ Classifieds: 'postingid' of 'postingdetails.php' AJ Forum: 'cate_id' of 'subcat.php' Exploiting these vulnerabilities could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks. A successful exploit could allow an attacker to compromise the software, access or modify data, or exploit vulnerabilities in the underlying database implementations. Version 1.0 of each application is vulnerable to these issues. Affected AJSquare AJ Auction 1.0 AJSquare AJ Classifieds 1.0 AJSquare AJDating 1.0 Response Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
WebAttackSQLInjectionAttempt Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description Multiple AJ Square products are prone to SQL-injection vulnerabilities. Additional Information AJ Square producsts (AJ Dating, AJ Auction, AJ Classifieds, and AJ Forum) are web-based applications implemented in PHP. The applications are prone to SQL-injection vulnerabilities because they fail to properly sanitize user-supplied input before using it in SQL queries. Specifically, these issues affect the following scripts and parameters: AJ Dating: 'user_id of 'view_profile.php' AJ Auction: 'cate_id' of 'subcat.php' AJ Classifieds: 'postingid' of 'postingdetails.php' AJ Forum: 'cate_id' of 'subcat.php' Exploiting these vulnerabilities could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks. A successful exploit could allow an attacker to compromise the software, access or modify data, or exploit vulnerabilities in the underlying database implementations. Version 1.0 of each application is vulnerable to these issues. Affected AJSquare AJ Auction 1.0 AJSquare AJ Classifieds 1.0 AJSquare AJDating 1.0 Response Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
Web Attack: SQL Injection Attempt 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects SQL injection attempts. Additional Information SQL Injection is a code injection attack that allows malicious users to execute arbitrary SQL commands on the database running in the affected website's back-end. This can lead to compromise of the whole website. Affected Various Web platforms. Response
Web Attack: SQL Injection Attempt 4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects SQL injection attempts. Additional Information SQL Injection is a code injection attack that allows malicious users to execute arbitrary SQL commands on the database running in the affected website's back-end. This can lead to compromise of the whole website. Affected Various Web platforms. Response
WebAttackSquidCacheFTPProxyURLBufferOverflow Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description A malicious remote attacker may be able to cause a denial of service or execute code on Squid proxy servers prior to 2.4Stable4. Additional Information A buffer overflow exists in the Squid proxy server's FTP URL handling. It may be possible for attackers to crash the squid process or execute arbitrary code. If a user has the ability to use the Squid process to proxy FTP requests, it may be possible for the user make a malicious request. By sending a custom-crafted ftp:// URL through the squid proxy, it is possible to crash the server, requiring manual restart to resume normal operation. This problem could also be exploited to allow the execution of code with the privileges of the Squid process, typically 'nobody'. This problem makes it possible for a user to deny service to legitimate users of the Squid cache. To exploit this vulnerability, and attacker must have the ability to use the Squid cache, and additionally be able to proxy FTP requests through the server. Affected MandrakeSoft Corporate Server 1.0.1 MandrakeSoft Linux Mandrake 7.1, 7.2, 8.0, 8.0 ppc MandrakeSoft Single Network Firewall 7.2 National Science Foundation Squid Web Proxy 2.0, 2.1, 2.2, 2.3, 2.3 STABLE4-11, 2.3 STABLE5, 2.3.1, 2.4, 2.4 STABLE1, 2.4 STABLE2, 2.4 STABLE2-2, 2.4 STABLE2-3, 2.4 STABLE3 RedHat Linux 6.2 alpha, 6.2 i386, 6.2 sparc, 7.0 alpha, 7.0 i386, 7.1 alpha, 7.1 i386, 7.1 ia64 S.u.S.E. Linux 6.4 alpha, 6.4 i386, 6.4 ppc, 7.0 alpha, 7.0 i386, 7.0 ppc, 7.0 sparc, 7.1 alpha, 7.1 ppc, 7.1 sparc, 7.1 x86, 7.2 i386, 7.3 i386, 7.3 ppc, 7.3 sparc SCO Open Server 5.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.0.6, 5.0.6 a Trustix Secure Linux 1.1, 1.2, 1.5 Response Patches are available:
WebAttackSquidServerRemoteCodeExecution Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in Squid proxy server. Additional Information A remote code execution vulnerability in exists in Squid proxy server that can lead to execution of arbitrary code on the server running the service. Affected Squid Server 2.5 Response
WebAttackSquidWebProxyVersionNumberParsingDOS Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description Squid is an open-source proxy server available for a number of platforms. Additional Information Squid is prone to a remote denial-of-service vulnerability caused by an unspecified error when processing requests with malformed HTTP version numbers. Successfully exploiting this issue allows remote attackers to crash the affected application, denying further service to legitimate users. Affected This issue affects versions prior to Squid 2.7.STABLE5, Squid 3.0.STABLE12, and Squid 3.1.0.4. Response Updates are available. Please see the references for more information.
WebAttackStackStormRemoteCodeExecutionCVE-2019-9580 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit a remote code execution vulnerability in StackStorm. Additional Information StackStorm is vulnerable to cross origins resource sharing vulnerability that can lead to execution of arbitrary code. Affected Versions 2.9.3 and 2.10.x before 2.10.3. Response
Web Attack: Stagil Navigation Jira Menu Themes Path Traversal CVE-2023-26255 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit path traversal vulnerability in STAGIL Navigation for Jira - Menu and Themes plugin. Additional Information An unauthenticated path traversal vulnerability affects the STAGIL Navigation for Jira - Menu and Themes plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjCustomDesignConfig endpoint, it is possible to traverse and read the file system. Affected STAGIL Navigation for Jira - Menu and Themes plugin before 2.0.52 for Jira. Response
WebAttackSteganoExploitKitRedirect Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits and payloads from Angler exploit kit that may compromise a computer through various vendor vulnerabilities. Additional Information Angler is an exploit kit that allows the remote attacker to perform various malicious actions on the compromised computer. Angler Exploit Kit commonly checks to see if the PC is having some AV software and has IE, Java or Flash vulnerable. If Angler Exploit Kit finds some AV software installed on computer it avoids dropping the exploit and payload. This exploit kit is known for dropping cryptolocker, Powliks, bedep etc payload, if attack is successful. Affected Various Windows platform Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following: • Report a potential false positive to Symantec.
WebAttackStyxExploitKit Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various Web Browsers
WebAttackStyxExploitKit2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various Web Browsers
WebAttackStyxExploitKit3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various Web Browsers
WebAttackStyxExploitKit4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various Web Browsers
WebAttackStyxExploitKit5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various Web Browsers
WebAttackStyxExploitKit6 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various Web Browsers
WebAttackStyxExploitKit7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various Web Browsers
WebAttackStyxExploitKit8 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various Web Browsers
WebAttackStyxExploitKit9 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various Web Browsers
WebAttackStyxExploitKitWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities. Additional Information Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer. Affected Various Web Browsers
WebAttackSundownExploitKitSilverlight Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSunDownExploitKitWebsite Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSunDownExploitKitWebsite2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSundownExploitKitWebsite3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSunDownExploitKitWebsite4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSunDownExploitKitWebsite5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
Web Attack: SunDown Exploit Kit Website 7 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
Web Attack: Sundown Payload Download Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebattackSunJavamail Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description Sun JavaMail is an API that provides a framework to build mail and messaging applications. Additional Information Sun JavaMail is an API that provides a framework to build mail and messaging applications. Sun JavaMail is prone to multiple information disclosure vulnerabilities. The issues exist due to a lack of sufficient input sanitization performed on user-supplied requests. The following issues are reported: A remote attacker may reveal the contents of email attachments of other users. An attacker may accomplish this by simply requesting a directory, inside of the 'mailboxesdir' directory, using a directory name that consists of the email address of the target user. A remote attacker may exploit this issue to disclose potentially sensitive information that could be used to aid in further attacks. A remote attacker may download and peruse arbitrary files with the privileges of the service by passing an absolute path to the target file as a parameter for the JavaMail 'Download' script. If the server has permissions to read the requested file, the contents are returned to the attacker. A remote attacker may exploit this issue to disclose potentially sensitive information that could be used to aid in further attacks. Affected Sun JavaMail 1.1.3, 1.2, 1.3, 1.3.2 Response Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]
WebAttackSunJavaUnsignedAppletCVE-2010-4452 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious JAR files Additional Information Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine. Affected Various Platforms
WebattackSunJavaWebServerCVE-2000-0812 Severity:Medium This attack could pose a moderate security threat. It does not require immediate action. Description The Java Web Server includes two features that when used together can be made to execute arbitrary code at the privilege level of the server. Additional Information The Java Web Server includes two features that when used together can be made to execute arbitrary code at the privilege level of the server. The Web Administration module listens on port 9090 for administrative commands via http. By using the /servlet/ prefix, it is possible for a remote user to point the servlet "com.sun.server.http.pagecompile.jsp92.JspServlet" to any file in or below the administration webroot for compilation and execution. The server also includes a sample application that provides bullettin board functionality. This application usesthe file board.html in the webroot to store all posted messages. Code can be entered as a posted message through the file /examples/applications/bboard/bboard_frames.html and will then be stored as part of board.html . Therefore, it is possible for a remote user to inject JSP code into board.html, and then have the server execute it via the Administration module, using a URL like: http:/target:9090/servlet/com.sun.server.http.pagecompile.jsp92.JspServlet/board.html Affected Sun Java Web Server 1.1.3, 2.0 Response Sun Java Web Server 1.1.3 JWS 1.1.3 Patch 3 Sun Java Web Server 2.0 JWS 2.0 Patch 3
Web Attack: Sun Java Web Server WebDAV BO Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempt to exploit a buffer overflow vulnerability in WebDav component of Sun Java System Web Server. Additional Information Sun Java System Web Server is an HTTP server. The application is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The issue arises in '/opt/sun/webserver7/lib/libdavplugin.so' when processing a specially crafted WebDAV request. Currently very few technical details are available. We will update this BID as more information emerges. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. Sun Java System Web Server 7.0 Update 7 and prior. Affected Sun Java System Web Server 7.0 Update 7 and prior.
WebAttackSunJavaWebstartBasicServiceImplCVE-2010-3563 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detect attempts to exploit a remote command execution vulnerability in Sun Java. Additional Information Oracle Java SE and Java for Business are prone to a remote vulnerability in Java Web Start 'BasicServiceImpl'. The vulnerability exists in the 'com.sun.jnlp.BasicServiceImpl' class. It is possible to exploit the vulnerability when Java Web Start retrieves security policies, allowing an attacker to provide their own security policies that remove restrictions that would ordinarily be applied in the Java sandbox. The vulnerability can be exploited to escape the Java sandbox and run arbitrary code in the context of the Java Runtime. This vulnerability affects the following supported versions: 6 Update 21 Affected This vulnerability affects the following supported versions: 6 Update 21
WebAttackSunJavaWebStartCVE-2012-0500 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the argument injection in JAVA. Additional Information Oracle Java SE is prone to a remote code-execution vulnerability in Java Runtime Environment. Specifically, the issue occurs because the application fails to properly validate the execution arguments when processing a crafted JNLP file. The vulnerability can be exploited over multiple protocols. This issue affects the 'Deployment' sub-component. Attackers can exploit the issue to execute arbitrary code within the context of the application. This vulnerability affects the following supported versions: 7 Update 2, 6 Update 30, JavaFX 2.0.2 Affected This vulnerability affects the following supported versions: 7 Update 2, 6 Update 30, JavaFX 2.0.2
Web Attack: Sunlogin RCE Vulnerability Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to exploit an remote code execution vulnerability in Sunlogin remote control software. Additional Information Sunlogin remote control software is a free integrated remote control management tool software that integrates remote control of computer mobile phones, remote desktop connection, remote boot, remote management, and support for intranet penetration.There is a remote execution vulnerability in the ping parameter of the Sunlogin remote control software, and attackers can use the vulnerability to execute arbitrary commands to control server permissions. Affected Sunlogin Personal Windows less than or equal to 11.0.0.33 and Sunlogin Lite less than or equal to V1.0.1.43315 (2021.12) Response
Web Attack: Supershell Tool Activity 2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects Supershell Tool activity on the affected machine. Additional Information Supershell is a C2 remote control platform. Successfully payload execution will allow attackers establishing a reverse SSH tunnel, a fully interactive shell to execute arbitrary code within the context of the application. Affected Various operating platforms. Response
WebAttackSuspiciousBrowserActivity2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSuspiciousBrowserActivity3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature will detects attempts to exploit a Remote Code Execution Vulnerability in Adobe Reader. Additional Information Adobe Reader and Acrobat are applications for handling PDF files. The software is prone to a remote code-execution vulnerability when handling specially crafted PDF files. Specifically, this issue is caused by a use-after-free error in the 'newplayer()' method of the 'Doc.media' JavaScript object. An attacker can exploit this issue to execute arbitrary code. Failed exploit attempts will likely cause denial-of-service conditions. This issue affects Reader and Acrobat 9.2 and prior versions. Response Currently we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of any recent information, please mail us at: [email protected]. NOTE: The vendor in currently investigating the vulnerability and will release updates by January 12, 2010 to resolve the issue.
Web Attack: Suspicious Browser Fingerprinting Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSuspiciousBrowserFingerprinting2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
Web Attack: Suspicious Browser Fingerprinting 3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSuspiciousChromeExtensionActivity Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download Fake Browser extensions on the user's machine. Additional Information Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine. Affected Various Browsers
WebAttackSuspiciousChromeExtensionActivity2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download Fake Browser extensions on the user's machine. Additional Information Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine. Affected Various Browsers
WebAttackSuspiciousChromeExtensionActivity3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download Fake Browser extensions on the user's machine. Additional Information Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine. Affected Various Browsers
WebAttackSuspiciousChromeExtensionDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download Fake Browser extensions on the user's machine. Additional Information Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine. Affected Various Browsers
WebAttackSuspiciousChromeExtensionDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download Fake Browser extensions on the user's machine. Additional Information Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine. Affected Various Browsers
WebAttackSuspiciousChromeExtensionDownload3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download Fake Browser extensions on the user's machine. Additional Information Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine. Affected Various Browsers
WebAttackSuspiciousChromeExtensionDownload4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download Fake Browser extensions on the user's machine. Additional Information Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine. Affected Various Browsers
Web Attack: Suspicious Discord CDN Content Download Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects the attempt to download content from Discord CDN. Additional Information Discord CDN is a public content distribution network. Attackers could use it to host malicious files as well as for C2 communication. Contents downloaded from Discord CDN should be treated as suspicious in Enterprise environment. Affected Various Windows platforms. Response
WebAttackSuspiciousExecutableFileDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious executable download coming from browser in the form of javascript attacks. Additional Information The script tag can be used to specify any file. If an image file is specified, the server will deliver the script (named script.jpg), but with a content-type of image/jpeg. Affected Internet Explorer (all versions) Firefox (all versions) Response The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines. 1. Restart the computer using the Windows Recovery Console. 2. Disable System Restore (Windows Me/XP). 3. Update the virus definitions. 4. Run a full system scan.
WebAttackSuspiciousExecutableFileDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious executable download coming from browser in the form of javascript attacks. Additional Information The script tag can be used to specify any file. If an image file is specified, the server will deliver the script (named script.jpg), but with a content-type of image/jpeg. Affected Internet Explorer (all versions) Firefox (all versions) Response The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines. 1. Restart the computer using the Windows Recovery Console. 2. Disable System Restore (Windows Me/XP). 3. Update the virus definitions. 4. Run a full system scan.
WebAttackSuspiciousExecutableFileDownload3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious executable download coming from browser in the form of javascript attacks. Additional Information The script tag can be used to specify any file. If an image file is specified, the server will deliver the script (named script.jpg), but with a content-type of image/jpeg. Affected Internet Explorer (all versions) Firefox (all versions) Response The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines. 1. Restart the computer using the Windows Recovery Console. 2. Disable System Restore (Windows Me/XP). 3. Update the virus definitions. 4. Run a full system scan.
Web Attack: Suspicious Executable File Download 4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious executable download coming from browser in the form of javascript attacks. Additional Information The script tag can be used to specify any file. If an image file is specified, the server will deliver the script (named script.jpg), but with a content-type of image/jpeg. Affected Internet Explorer (all versions) Firefox (all versions) Response The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines. 1. Restart the computer using the Windows Recovery Console. 2. Disable System Restore (Windows Me/XP). 3. Update the virus definitions. 4. Run a full system scan.
WebAttackSuspiciousExecutableFileDownload5 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious executable download coming from browser in the form of javascript attacks. Additional Information The script tag can be used to specify any file. If an image file is specified, the server will deliver the script (named script.jpg), but with a content-type of image/jpeg. Affected Internet Explorer (all versions) Firefox (all versions) Response The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines. 1. Restart the computer using the Windows Recovery Console. 2. Disable System Restore (Windows Me/XP). 3. Update the virus definitions. 4. Run a full system scan.
Web Attack: Suspicious Executable Image Download Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects malicious executable download coming from browser in the form of javascript attacks. Additional Information The script tag can be used to specify any file. If an image file is specified, the server will deliver the script (named script.jpg), but with a content-type of image/jpeg. Affected Internet Explorer (all versions) Firefox (all versions) Response The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines. 1. Restart the computer using the Windows Recovery Console. 2. Disable System Restore (Windows Me/XP). 3. Update the virus definitions. 4. Run a full system scan.
WebAttackSuspiciousExploitKit Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSuspiciousFlashDownload Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities. Additional Information Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc. Affected Various Browsers. Response If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website. If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
WebAttackSuspiciousIframeWebpage Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects hidden iframes injected into webpages. Additional Information These iframes have style attribute set to hidden or height and width = 0 to remain invisible. Affected Microsoft Internet Explorer 5.0 Response No further action is required but you may wish to perform some of the following actions as a precautionary measure. • Update your product definitions and perform a full system scan. • Submit suspicious files to Symantec for analysis. If you believe that the signature is reported erroneously, please read the following: • Report a potential false positive to Symantec.
WebAttackSuspiciousJarDownload-ZelixClassMasterObfuscation Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious JAR files. Additional Information Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine. Affected Various platforms. Response
WebAttackSuspiciousJarDownload10 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious JAR files. Additional Information Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine. Affected Various platforms. Response
WebAttackSuspiciousJarDownload11 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious JAR files. Additional Information Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine. Affected Various platforms. Response
WebAttackSuspiciousJarDownload2 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious JAR files. Additional Information Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine. Affected Various platforms. Response
WebAttackSuspiciousJarDownload3 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious JAR files. Additional Information Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine. Affected Various platforms. Response
WebAttackSuspiciousJarDownload4 Severity:High This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening. Description This signature detects attempts to download malicious JAR files. Additional Information Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine. Affected Various platforms. Response