text
stringlengths 0
383k
|
---|
Web Attack: Sonatype Nexus Repository RCE CVE-2020-10199
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempts to exploit a remote code execution vulnerability in Sonatype Nexus Repository.
Additional Information
A vulnerability exists in Sonatype Nexus Repository that can lead to execution of remote code.
Affected
Versions before 3.21.2.
Response
|
WebAttackSonatypeNexusRepositoryRCECVE-2020-10204
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempts to exploit a remote code execution vulnerability in Sonatype Nexus Repository.
Additional Information
A vulnerability exists in Sonatype Nexus Repository that can lead to execution of remote code.
Affected
Versions before 3.21.2.
Response
|
Web Attack: Sonicwall Email Security CVE-2021-20023
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a directory traversal vulnerability in SonicWall Email Security.
Additional Information
A vulnerability exists in SonicWall Email Security that can lead to arbitrary file read.
Affected
SonicWall Email Security version 10.0.9.x.
Response
|
WebAttackSonicWallGlobalMgmtSystemXMLRPCRCE
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in SonicWall Global Management system.
Additional Information
An vulnerability exists in SonicWall Global Management System's XMLRPC implementation that can lead to execution of unauthorized code on the vulnerable systems.
Affected
Versions 8.1 Build 8110.1197 and below
Response
|
Web Attack: Sophos Firewall CVE-2022-1040 Scanning
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Authentication Bypass vulnerability on the affected machine.
Additional Information
Sophos Firewall is vulnerable to Authentication Bypass attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
Sophos Firewall version v18.5 MR3 and older.
Response
|
Web Attack: Sophos Web Appliance Command Injection CVE-2023-1671
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a command injection vulnerability in Sophos Web Appliance older than version 4.3.10.4.
Additional Information
A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code.
Affected
Sophos Web Appliance older than version 4.3.10.4.
Response
|
WebAttackSophosXGFirewallCVE-2020-15504
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit SQL Injection vulnerability on the affected machine.
Additional Information
Sophos XG Firewall is prone to an SQL-injection vulnerability in the user and admin web interfaces of Sophos XG Firewall v18.0 MR1 and older, potentially allows an attacker to run arbitrary code remotely
Affected
Sophos XG Firewall prior to version v18.0 MR1
Response
|
Web Attack: Sourcecodester System CVE-2020-29227
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Local File Include vulnerability on the affected machine.
Additional Information
Sourcecodester's Car Rental Management System is vulnerable to Local File Include attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
An issue was discovered in Car Rental Management System 1.0
Response
|
WebAttackSpamCampaigndomains
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackSpamCampaigndomains12
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackSpamCampaigndomains13
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackSpamCampaigndomains14
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackSpamCampaigndomains2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackSpamCampaigndomains3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackSpamCampaigndomains4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackSpamCampaigndomains5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackSpamCampaigndomains6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackSpamCampaigndomains7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackSpamCampaigndomains8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackSpamCampaigndomains9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackSpamMaliciousJSDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the websites associated with the spam campaign.
Additional Information
This signature detects the websites associated with the spam campaign.
Affected
All browsers
|
WebAttackSpartanExploitKitFlashExploit
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits and payloads from Spartan exploit kit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Spartan is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various Windows platform
|
WebAttackSpartanExploitKitWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits and payloads from Spartan exploit kit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Spartan is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various Windows platform
|
Web Attack: Spelevo Exploit Kit Website
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Web Attack: Spelevo Exploit Kit Website 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Web Attack: Splunk RCE CVE-2023-46214
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Splunk.
Additional Information
Splunk is prone to a vulnerability that can lead to execution of remote code.
Affected
Splunk Enterprise versions below 9.0.7 and 9.1.2.
Response
|
Web Attack: Spring Boot Actuator Directory Traversal CVE-2021-21234
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Directory Traversal vulnerability in Spring Boot Actuator Logview.
Additional Information
In spring-boot-actuator-logview before version 0.2.13 there is a directory traversal vulnerability. The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal exploits (so that filename..somefile would not work), the base folder parameter was not sufficiently checked, so that filename=somefile and base.. could access a file outside the logging base directory). spring-boot-actuator-logview in a library that adds a simple logfile viewer as spring boot actuator endpoint.
Affected
Spring Boot Actuator Logview before version 0.2.13
Response
|
Web Attack: Spring Boot Remote Code Execution
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempts to exploit a remote code execution vulnerability in Spring Boot.
Additional Information
A vulnerability exists in Spring Boot that can lead to execution of remote code.
Affected
Spring Boot.
Response
|
Web Attack: Spring Cloud Gateway Code Injection CVE-2022-22947
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Spring Cloud Gateway.
Additional Information
A vulnerability exists in Spring Cloud Gateway that can lead to execution of arbitrary code.
Affected
Spring Cloud Gversions prior to 3.1.1+ and 3.0.7+.
Response
|
Web Attack: Spring Clouds Config Directory Traversal CVE-2019-3799
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a directory traversal vulnerability in Spring Clouds Config.
Additional Information
A directory traversal vulnerability exists in Spring Cloud Config that can lead to applications obtaining arbitrary configuration files.
Affected
Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6.
Response
|
Web Attack: Spring Data Commons CVE-2018-1273
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Spring Data Commons.
Additional Information
A remote code execution vulnerability exists in Spring Data REST backed HTTP resources which can lead to execution of arbitrary code.
Affected
Versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5.
Response
|
Web Attack: Spring Framework CVE-2022-22965
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Spring4Shell Remote Code Execution vulnerability on the affected machine.
Additional Information
Spring Framework is vulnerable to Spring4Shell attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
Various Operating Systems
Response
|
Web Attack: Spring Framework CVE-2022-22965 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Spring4Shell Remote Code Execution vulnerability on the affected machine.
Additional Information
Spring Framework is vulnerable to Spring4Shell attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
Various Operating Systems
Response
|
Web Attack: Spring Framework CVE-2022-22965 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to exploit Spring4Shell Remote Code Execution vulnerability on the affected machine.
Additional Information
Spring Framework is vulnerable to Spring4Shell attack. Successfully exploiting these issues will allow attackers to execute arbitrary code within the context of the application.
Affected
Various Operating Systems
Response
|
Web Attack: Spring MVC Directory Traversal Vulnerability CVE-2018-1271
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
A Directory Traversal vulnerability in Spring MVC, Spring Framework versions 5.0 to 5.0.4, 4.3 to 4.3.14, and older unsupported versions which could help a malicious user to send a request using a specially crafted URL that can lead a directory traversal attack.
Additional Information
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.
Affected
Spring Framework versions 5.0 to 5.0.4, 4.3 to 4.3.14, and older unsupported versions
Response
Update to latest available version
|
WebAttackSpyEyeWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects trojan.spyeye activity.
Additional Information
Trojan.Spyeye is a Trojan horse that may steal information from the compromised computer by installing a backdoor.
|
WebattackSqlInjection
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
Multiple AJ Square products are prone to SQL-injection vulnerabilities.
Additional Information
AJ Square producsts (AJ Dating, AJ Auction, AJ Classifieds, and AJ Forum) are web-based applications implemented in PHP.
The applications are prone to SQL-injection vulnerabilities because they fail to properly sanitize user-supplied input before using it in SQL queries. Specifically, these issues affect the following scripts and parameters:
AJ Dating: 'user_id of 'view_profile.php'
AJ Auction: 'cate_id' of 'subcat.php'
AJ Classifieds: 'postingid' of 'postingdetails.php'
AJ Forum: 'cate_id' of 'subcat.php'
Exploiting these vulnerabilities could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks.
A successful exploit could allow an attacker to compromise the software, access or modify data, or exploit vulnerabilities in the underlying database implementations.
Version 1.0 of each application is vulnerable to these issues.
Affected
AJSquare AJ Auction 1.0
AJSquare AJ Classifieds 1.0
AJSquare AJDating 1.0
Response
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
|
WebAttackSQLInjectionAttempt
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
Multiple AJ Square products are prone to SQL-injection vulnerabilities.
Additional Information
AJ Square producsts (AJ Dating, AJ Auction, AJ Classifieds, and AJ Forum) are web-based applications implemented in PHP.
The applications are prone to SQL-injection vulnerabilities because they fail to properly sanitize user-supplied input before using it in SQL queries. Specifically, these issues affect the following scripts and parameters:
AJ Dating: 'user_id of 'view_profile.php'
AJ Auction: 'cate_id' of 'subcat.php'
AJ Classifieds: 'postingid' of 'postingdetails.php'
AJ Forum: 'cate_id' of 'subcat.php'
Exploiting these vulnerabilities could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks.
A successful exploit could allow an attacker to compromise the software, access or modify data, or exploit vulnerabilities in the underlying database implementations.
Version 1.0 of each application is vulnerable to these issues.
Affected
AJSquare AJ Auction 1.0
AJSquare AJ Classifieds 1.0
AJSquare AJDating 1.0
Response
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
|
Web Attack: SQL Injection Attempt 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects SQL injection attempts.
Additional Information
SQL Injection is a code injection attack that allows malicious users to execute arbitrary SQL commands on the database running in the affected website's back-end. This can lead to compromise of the whole website.
Affected
Various Web platforms.
Response
|
Web Attack: SQL Injection Attempt 4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects SQL injection attempts.
Additional Information
SQL Injection is a code injection attack that allows malicious users to execute arbitrary SQL commands on the database running in the affected website's back-end. This can lead to compromise of the whole website.
Affected
Various Web platforms.
Response
|
WebAttackSquidCacheFTPProxyURLBufferOverflow
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
A malicious remote attacker may be able to cause a denial of service or execute code on Squid proxy servers prior to 2.4Stable4.
Additional Information
A buffer overflow exists in the Squid proxy server's FTP URL handling.
It may be possible for attackers to crash the squid process or execute arbitrary code.
If a user has the ability to use the Squid process to proxy FTP requests, it may be possible for the user make a malicious request. By sending a custom-crafted ftp:// URL through the squid proxy, it is possible to crash the server, requiring manual restart to resume normal operation.
This problem could also be exploited to allow the execution of code with the privileges of the Squid process, typically 'nobody'.
This problem makes it possible for a user to deny service to legitimate users of the Squid cache. To exploit this vulnerability, and attacker must have the ability to use the Squid cache, and additionally be able to proxy FTP requests through the server.
Affected
MandrakeSoft Corporate Server 1.0.1
MandrakeSoft Linux Mandrake 7.1, 7.2, 8.0, 8.0 ppc
MandrakeSoft Single Network Firewall 7.2
National Science Foundation Squid Web Proxy 2.0, 2.1, 2.2, 2.3, 2.3 STABLE4-11, 2.3 STABLE5, 2.3.1, 2.4, 2.4 STABLE1, 2.4 STABLE2, 2.4 STABLE2-2, 2.4 STABLE2-3, 2.4 STABLE3
RedHat Linux 6.2 alpha, 6.2 i386, 6.2 sparc, 7.0 alpha, 7.0 i386, 7.1 alpha, 7.1 i386, 7.1 ia64
S.u.S.E. Linux 6.4 alpha, 6.4 i386, 6.4 ppc, 7.0 alpha, 7.0 i386, 7.0 ppc, 7.0 sparc, 7.1 alpha, 7.1 ppc, 7.1 sparc, 7.1 x86, 7.2 i386, 7.3 i386, 7.3 ppc, 7.3 sparc
SCO Open Server 5.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.0.6, 5.0.6 a
Trustix Secure Linux 1.1, 1.2, 1.5
Response
Patches are available:
|
WebAttackSquidServerRemoteCodeExecution
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in Squid proxy server.
Additional Information
A remote code execution vulnerability in exists in Squid proxy server that can lead to execution of arbitrary code on the server running the service.
Affected
Squid Server 2.5
Response
|
WebAttackSquidWebProxyVersionNumberParsingDOS
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
Squid is an open-source proxy server available for a number of platforms.
Additional Information
Squid is prone to a remote denial-of-service vulnerability caused by an unspecified error when processing requests with malformed HTTP version numbers.
Successfully exploiting this issue allows remote attackers to crash the affected application, denying further service to legitimate users.
Affected
This issue affects versions prior to Squid 2.7.STABLE5, Squid 3.0.STABLE12, and Squid 3.1.0.4.
Response
Updates are available. Please see the references for more information.
|
WebAttackStackStormRemoteCodeExecutionCVE-2019-9580
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit a remote code execution vulnerability in StackStorm.
Additional Information
StackStorm is vulnerable to cross origins resource sharing vulnerability that can lead to execution of arbitrary code.
Affected
Versions 2.9.3 and 2.10.x before 2.10.3.
Response
|
Web Attack: Stagil Navigation Jira Menu Themes Path Traversal CVE-2023-26255
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit path traversal vulnerability in STAGIL Navigation for Jira - Menu and Themes plugin.
Additional Information
An unauthenticated path traversal vulnerability affects the STAGIL Navigation for Jira - Menu and Themes plugin before 2.0.52 for Jira. By modifying the fileName parameter to the snjCustomDesignConfig endpoint, it is possible to traverse and read the file system.
Affected
STAGIL Navigation for Jira - Menu and Themes plugin before 2.0.52 for Jira.
Response
|
WebAttackSteganoExploitKitRedirect
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits and payloads from Angler exploit kit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Angler is an exploit kit that allows the remote attacker to perform various malicious actions on the compromised computer. Angler Exploit Kit commonly checks to see if the PC is having some AV software and has IE, Java or Flash vulnerable. If Angler Exploit Kit finds some AV software installed on computer it avoids dropping the exploit and payload.
This exploit kit is known for dropping cryptolocker, Powliks, bedep etc payload, if attack is successful.
Affected
Various Windows platform
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
• Report a potential false positive to Symantec.
|
WebAttackStyxExploitKit
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various Web Browsers
|
WebAttackStyxExploitKit2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various Web Browsers
|
WebAttackStyxExploitKit3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various Web Browsers
|
WebAttackStyxExploitKit4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various Web Browsers
|
WebAttackStyxExploitKit5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various Web Browsers
|
WebAttackStyxExploitKit6
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various Web Browsers
|
WebAttackStyxExploitKit7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various Web Browsers
|
WebAttackStyxExploitKit8
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various Web Browsers
|
WebAttackStyxExploitKit9
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various Web Browsers
|
WebAttackStyxExploitKitWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from Nullhole Exploit kit also known as Styx toolkit that may compromise a computer through various vendor vulnerabilities.
Additional Information
Styx or Nullhole is an attack toolkit that allows the remote attacker to perform various malicious actions on the compromised computer.
Affected
Various Web Browsers
|
WebAttackSundownExploitKitSilverlight
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSunDownExploitKitWebsite
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSunDownExploitKitWebsite2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSundownExploitKitWebsite3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSunDownExploitKitWebsite4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSunDownExploitKitWebsite5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Web Attack: SunDown Exploit Kit Website 7
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Web Attack: Sundown Payload Download
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebattackSunJavamail
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
Sun JavaMail is an API that provides a framework to build mail and messaging applications.
Additional Information
Sun JavaMail is an API that provides a framework to build mail and messaging applications.
Sun JavaMail is prone to multiple information disclosure vulnerabilities. The issues exist due to a lack of sufficient input sanitization performed on user-supplied requests. The following issues are reported:
A remote attacker may reveal the contents of email attachments of other users. An attacker may accomplish this by simply requesting a directory, inside of the 'mailboxesdir' directory, using a directory name that consists of the email address of the target user.
A remote attacker may exploit this issue to disclose potentially sensitive information that could be used to aid in further attacks.
A remote attacker may download and peruse arbitrary files with the privileges of the service by passing an absolute path to the target file as a parameter for the JavaMail 'Download' script. If the server has permissions to read the requested file, the contents are returned to the attacker.
A remote attacker may exploit this issue to disclose potentially sensitive information that could be used to aid in further attacks.
Affected
Sun JavaMail 1.1.3, 1.2, 1.3, 1.3.2
Response
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]
|
WebAttackSunJavaUnsignedAppletCVE-2010-4452
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JAR files
Additional Information
Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine.
Affected
Various Platforms
|
WebattackSunJavaWebServerCVE-2000-0812
Severity:Medium
This attack could pose a moderate security threat. It does not require immediate action.
Description
The Java Web Server includes two features that when used together can be made to execute arbitrary code at the privilege level of the server.
Additional Information
The Java Web Server includes two features that when used together can be made to execute arbitrary code at the privilege level of the server.
The Web Administration module listens on port 9090 for administrative commands via http. By using the /servlet/ prefix, it is possible for a remote user to point the servlet "com.sun.server.http.pagecompile.jsp92.JspServlet" to any file in or below the administration webroot for compilation and execution.
The server also includes a sample application that provides bullettin board functionality. This application usesthe file board.html in the webroot to store all posted messages. Code can be entered as a posted message through the file /examples/applications/bboard/bboard_frames.html and will then be stored as part of board.html .
Therefore, it is possible for a remote user to inject JSP code into board.html, and then have the server execute it via the Administration module, using a URL like:
http:/target:9090/servlet/com.sun.server.http.pagecompile.jsp92.JspServlet/board.html
Affected
Sun Java Web Server 1.1.3, 2.0
Response
Sun Java Web Server 1.1.3
JWS 1.1.3 Patch 3
Sun Java Web Server 2.0
JWS 2.0 Patch 3
|
Web Attack: Sun Java Web Server WebDAV BO
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempt to exploit a buffer overflow vulnerability in WebDav component of Sun Java System Web Server.
Additional Information
Sun Java System Web Server is an HTTP server.
The application is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The issue arises in '/opt/sun/webserver7/lib/libdavplugin.so' when processing a specially crafted WebDAV request.
Currently very few technical details are available. We will update this BID as more information emerges.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
Sun Java System Web Server 7.0 Update 7 and prior.
Affected
Sun Java System Web Server 7.0 Update 7 and prior.
|
WebAttackSunJavaWebstartBasicServiceImplCVE-2010-3563
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detect attempts to exploit a remote command execution vulnerability in Sun Java.
Additional Information
Oracle Java SE and Java for Business are prone to a remote vulnerability in Java Web Start 'BasicServiceImpl'.
The vulnerability exists in the 'com.sun.jnlp.BasicServiceImpl' class. It is possible to exploit the vulnerability when Java Web Start retrieves security policies, allowing an attacker to provide their own security policies that remove restrictions that would ordinarily be applied in the Java sandbox. The vulnerability can be exploited to escape the Java sandbox and run arbitrary code in the context of the Java Runtime.
This vulnerability affects the following supported versions:
6 Update 21
Affected
This vulnerability affects the following supported versions:
6 Update 21
|
WebAttackSunJavaWebStartCVE-2012-0500
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the argument injection in JAVA.
Additional Information
Oracle Java SE is prone to a remote code-execution vulnerability in Java Runtime Environment. Specifically, the issue occurs because the application fails to properly validate the execution arguments when processing a crafted JNLP file.
The vulnerability can be exploited over multiple protocols. This issue affects the 'Deployment' sub-component.
Attackers can exploit the issue to execute arbitrary code within the context of the application.
This vulnerability affects the following supported versions:
7 Update 2, 6 Update 30, JavaFX 2.0.2
Affected
This vulnerability affects the following supported versions:
7 Update 2, 6 Update 30, JavaFX 2.0.2
|
Web Attack: Sunlogin RCE Vulnerability
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to exploit an remote code execution vulnerability in Sunlogin remote control software.
Additional Information
Sunlogin remote control software is a free integrated remote control management tool software that integrates remote control of computer mobile phones, remote desktop connection, remote boot, remote management, and support for intranet penetration.There is a remote execution vulnerability in the ping parameter of the Sunlogin remote control software, and attackers can use the vulnerability to execute arbitrary commands to control server permissions.
Affected
Sunlogin Personal Windows less than or equal to 11.0.0.33 and Sunlogin Lite less than or equal to V1.0.1.43315 (2021.12)
Response
|
Web Attack: Supershell Tool Activity 2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects Supershell Tool activity on the affected machine.
Additional Information
Supershell is a C2 remote control platform. Successfully payload execution will allow attackers establishing a reverse SSH tunnel, a fully interactive shell to execute arbitrary code within the context of the application.
Affected
Various operating platforms.
Response
|
WebAttackSuspiciousBrowserActivity2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSuspiciousBrowserActivity3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature will detects attempts to exploit a Remote Code Execution Vulnerability in Adobe Reader.
Additional Information
Adobe Reader and Acrobat are applications for handling PDF files.
The software is prone to a remote code-execution vulnerability when handling specially crafted PDF files. Specifically, this issue is caused by a use-after-free error in the 'newplayer()' method of the 'Doc.media' JavaScript object.
An attacker can exploit this issue to execute arbitrary code. Failed exploit attempts will likely cause denial-of-service conditions.
This issue affects Reader and Acrobat 9.2 and prior versions.
Response
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of any recent information, please mail us at: [email protected].
NOTE: The vendor in currently investigating the vulnerability and will release updates by January 12, 2010 to resolve the issue.
|
Web Attack: Suspicious Browser Fingerprinting
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSuspiciousBrowserFingerprinting2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
Web Attack: Suspicious Browser Fingerprinting 3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSuspiciousChromeExtensionActivity
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download Fake Browser extensions on the user's machine.
Additional Information
Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine.
Affected
Various Browsers
|
WebAttackSuspiciousChromeExtensionActivity2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download Fake Browser extensions on the user's machine.
Additional Information
Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine.
Affected
Various Browsers
|
WebAttackSuspiciousChromeExtensionActivity3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download Fake Browser extensions on the user's machine.
Additional Information
Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine.
Affected
Various Browsers
|
WebAttackSuspiciousChromeExtensionDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download Fake Browser extensions on the user's machine.
Additional Information
Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine.
Affected
Various Browsers
|
WebAttackSuspiciousChromeExtensionDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download Fake Browser extensions on the user's machine.
Additional Information
Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine.
Affected
Various Browsers
|
WebAttackSuspiciousChromeExtensionDownload3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download Fake Browser extensions on the user's machine.
Additional Information
Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine.
Affected
Various Browsers
|
WebAttackSuspiciousChromeExtensionDownload4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download Fake Browser extensions on the user's machine.
Additional Information
Rogue browser extensions can pose like legitimate extensions but when installed can steal sensitive information from the infected machine.
Affected
Various Browsers
|
Web Attack: Suspicious Discord CDN Content Download
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects the attempt to download content from Discord CDN.
Additional Information
Discord CDN is a public content distribution network. Attackers could use it to host malicious files as well as for C2 communication.
Contents downloaded from Discord CDN should be treated as suspicious in Enterprise environment.
Affected
Various Windows platforms.
Response
|
WebAttackSuspiciousExecutableFileDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious executable download coming from browser in the form of javascript attacks.
Additional Information
The script tag can be used to specify any file. If an image file is specified, the server will deliver the script (named script.jpg), but with a content-type of image/jpeg.
Affected
Internet Explorer (all versions)
Firefox (all versions)
Response
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Restart the computer using the Windows Recovery Console.
2. Disable System Restore (Windows Me/XP).
3. Update the virus definitions.
4. Run a full system scan.
|
WebAttackSuspiciousExecutableFileDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious executable download coming from browser in the form of javascript attacks.
Additional Information
The script tag can be used to specify any file. If an image file is specified, the server will deliver the script (named script.jpg), but with a content-type of image/jpeg.
Affected
Internet Explorer (all versions)
Firefox (all versions)
Response
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Restart the computer using the Windows Recovery Console.
2. Disable System Restore (Windows Me/XP).
3. Update the virus definitions.
4. Run a full system scan.
|
WebAttackSuspiciousExecutableFileDownload3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious executable download coming from browser in the form of javascript attacks.
Additional Information
The script tag can be used to specify any file. If an image file is specified, the server will deliver the script (named script.jpg), but with a content-type of image/jpeg.
Affected
Internet Explorer (all versions)
Firefox (all versions)
Response
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Restart the computer using the Windows Recovery Console.
2. Disable System Restore (Windows Me/XP).
3. Update the virus definitions.
4. Run a full system scan.
|
Web Attack: Suspicious Executable File Download 4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious executable download coming from browser in the form of javascript attacks.
Additional Information
The script tag can be used to specify any file. If an image file is specified, the server will deliver the script (named script.jpg), but with a content-type of image/jpeg.
Affected
Internet Explorer (all versions)
Firefox (all versions)
Response
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Restart the computer using the Windows Recovery Console.
2. Disable System Restore (Windows Me/XP).
3. Update the virus definitions.
4. Run a full system scan.
|
WebAttackSuspiciousExecutableFileDownload5
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious executable download coming from browser in the form of javascript attacks.
Additional Information
The script tag can be used to specify any file. If an image file is specified, the server will deliver the script (named script.jpg), but with a content-type of image/jpeg.
Affected
Internet Explorer (all versions)
Firefox (all versions)
Response
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Restart the computer using the Windows Recovery Console.
2. Disable System Restore (Windows Me/XP).
3. Update the virus definitions.
4. Run a full system scan.
|
Web Attack: Suspicious Executable Image Download
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects malicious executable download coming from browser in the form of javascript attacks.
Additional Information
The script tag can be used to specify any file. If an image file is specified, the server will deliver the script (named script.jpg), but with a content-type of image/jpeg.
Affected
Internet Explorer (all versions)
Firefox (all versions)
Response
The following instructions pertain to all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Restart the computer using the Windows Recovery Console.
2. Disable System Restore (Windows Me/XP).
3. Update the virus definitions.
4. Run a full system scan.
|
WebAttackSuspiciousExploitKit
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSuspiciousFlashDownload
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download exploits from a malicious toolkit which may compromise a computer through various vendor vulnerabilities.
Additional Information
Malicious toolkits contain various exploits bundled into a single package.Victim on visiting the malicious server hosting exploit toolkit is attacked with several different exploits exploiting different vulnerabilities one by one.Exploits may include MDAC,PDF,HCP etc.
Affected
Various Browsers.
Response
If you are a Norton user and wish to access a website blocked by Intrusion Prevention, please go through the exclusion process listed at https://support.norton.com/sp/en/us/home/current/solutions/v1224806_ns_retail_en_us to exclude the Intrusion Prevention detection blocking the given website.
If you are an Enterprise Product user, please go through the exclusion process listed at https://support.symantec.com/en_US/article.HOWTO80883.html to exclude the Intrusion Prevention detection.
|
WebAttackSuspiciousIframeWebpage
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects hidden iframes injected into webpages.
Additional Information
These iframes have style attribute set to hidden or height and width = 0 to remain invisible.
Affected
Microsoft Internet Explorer 5.0
Response
No further action is required but you may wish to perform some of the following actions as a precautionary measure.
• Update your product definitions and perform a full system scan.
• Submit suspicious files to Symantec for analysis.
If you believe that the signature is reported erroneously, please read the following:
• Report a potential false positive to Symantec.
|
WebAttackSuspiciousJarDownload-ZelixClassMasterObfuscation
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JAR files.
Additional Information
Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine.
Affected
Various platforms.
Response
|
WebAttackSuspiciousJarDownload10
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JAR files.
Additional Information
Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine.
Affected
Various platforms.
Response
|
WebAttackSuspiciousJarDownload11
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JAR files.
Additional Information
Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine.
Affected
Various platforms.
Response
|
WebAttackSuspiciousJarDownload2
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JAR files.
Additional Information
Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine.
Affected
Various platforms.
Response
|
WebAttackSuspiciousJarDownload3
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JAR files.
Additional Information
Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine.
Affected
Various platforms.
Response
|
WebAttackSuspiciousJarDownload4
Severity:High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
Description
This signature detects attempts to download malicious JAR files.
Additional Information
Malicious website hosts JAR files which when executed on the machine may download additional malicious files and compromise the security of the machine.
Affected
Various platforms.
Response
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.