Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Update Details

Security Intelligence Center
Print

Update #2991 (09/21/2017)

82 new signatures:

MEDIUMHTTP:MAL-REDIRECT-VUL-61HTTP: MAL-REDIRECT Infection-61
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-62HTTP: SUSP-HDR-REDRCT Infection-62
MEDIUMHTTP:SCRIPT-INJ-VUL-63HTTP: SCRIPT-INJ Infection-63
MEDIUMHTTP:MAL-REDIRECT-VUL-64HTTP: MAL-REDIRECT Infection-64
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-65HTTP: SUSP-HDR-REDRCT Infection-65
MEDIUMHTTP:SCRIPT-INJ-VUL-66HTTP: SCRIPT-INJ Infection-66
MEDIUMHTTP:MAL-REDIRECT-VUL-67HTTP: MAL-REDIRECT Infection-67
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-68HTTP: SUSP-HDR-REDRCT Infection-68
MEDIUMHTTP:SCRIPT-INJ-VUL-69HTTP: SCRIPT-INJ Infection-69
MEDIUMHTTP:MAL-REDIRECT-VUL-70HTTP: MAL-REDIRECT Infection-70
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-71HTTP: SUSP-HDR-REDRCT Infection-71
MEDIUMHTTP:SCRIPT-INJ-VUL-72HTTP: SCRIPT-INJ Infection-72
MEDIUMHTTP:MAL-REDIRECT-VUL-73HTTP: MAL-REDIRECT Infection-73
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-74HTTP: SUSP-HDR-REDRCT Infection-74
MEDIUMHTTP:SCRIPT-INJ-VUL-75HTTP: SCRIPT-INJ Infection-75
MEDIUMHTTP:MAL-REDIRECT-VUL-76HTTP: MAL-REDIRECT Infection-76
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-77HTTP: SUSP-HDR-REDRCT Infection-77
HIGHHTTP:STC:HPE-LANG-INJHTTP: HPE Intelligent Management Center saveSelectedDevices Expression Language Injection
HIGHHTTP:TM-ISMS-RCEHTTP: Trend Micro InterScan Messaging Security Remote Code Execution
HIGHHTTP:STC:DL:MS-CVE-2017-8728-BOHTTP: Microsoft Windows PDF Library Heap-based Buffer Overflow
HIGHAPP:MISC:RACER-BOAPP: Racer Remote Buffer Overflow
MEDIUMHTTP:SCRIPT-INJ-VUL-0HTTP: SCRIPT-INJ Infection-0
MEDIUMHTTP:MAL-REDIRECT-VUL-1HTTP: MAL-REDIRECT Infection-1
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-2HTTP: SUSP-HDR-REDRCT Infection-2
MEDIUMHTTP:SCRIPT-INJ-VUL-3HTTP: SCRIPT-INJ Infection-3
MEDIUMHTTP:MAL-REDIRECT-VUL-4HTTP: MAL-REDIRECT Infection-4
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-5HTTP: SUSP-HDR-REDRCT Infection-5
MEDIUMHTTP:SCRIPT-INJ-VUL-6HTTP: SCRIPT-INJ Infection-6
MEDIUMHTTP:MAL-REDIRECT-VUL-7HTTP: MAL-REDIRECT Infection-7
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-8HTTP: SUSP-HDR-REDRCT Infection-8
MEDIUMHTTP:SCRIPT-INJ-VUL-9HTTP: SCRIPT-INJ Infection-9
MEDIUMHTTP:MAL-REDIRECT-VUL-10HTTP: MAL-REDIRECT Infection-10
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-11HTTP: SUSP-HDR-REDRCT Infection-11
MEDIUMHTTP:SCRIPT-INJ-VUL-12HTTP: SCRIPT-INJ Infection-12
MEDIUMHTTP:MAL-REDIRECT-VUL-13HTTP: MAL-REDIRECT Infection-13
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-14HTTP: SUSP-HDR-REDRCT Infection-14
MEDIUMHTTP:SCRIPT-INJ-VUL-15HTTP: SCRIPT-INJ Infection-15
MEDIUMHTTP:MAL-REDIRECT-VUL-16HTTP: MAL-REDIRECT Infection-16
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-17HTTP: SUSP-HDR-REDRCT Infection-17
MEDIUMHTTP:SCRIPT-INJ-VUL-18HTTP: SCRIPT-INJ Infection-18
MEDIUMHTTP:MAL-REDIRECT-VUL-19HTTP: MAL-REDIRECT Infection-19
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-20HTTP: SUSP-HDR-REDRCT Infection-20
MEDIUMHTTP:SCRIPT-INJ-VUL-21HTTP: SCRIPT-INJ Infection-21
MEDIUMHTTP:MAL-REDIRECT-VUL-22HTTP: MAL-REDIRECT Infection-22
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-23HTTP: SUSP-HDR-REDRCT Infection-23
MEDIUMHTTP:SCRIPT-INJ-VUL-24HTTP: SCRIPT-INJ Infection-24
MEDIUMHTTP:MAL-REDIRECT-VUL-25HTTP: MAL-REDIRECT Infection-25
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-26HTTP: SUSP-HDR-REDRCT Infection-26
MEDIUMHTTP:SCRIPT-INJ-VUL-27HTTP: SCRIPT-INJ Infection-27
MEDIUMHTTP:MAL-REDIRECT-VUL-28HTTP: MAL-REDIRECT Infection-28
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-29HTTP: SUSP-HDR-REDRCT Infection-29
MEDIUMHTTP:SCRIPT-INJ-VUL-30HTTP: SCRIPT-INJ Infection-30
MEDIUMHTTP:MAL-REDIRECT-VUL-31HTTP: MAL-REDIRECT Infection-31
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-32HTTP: SUSP-HDR-REDRCT Infection-32
MEDIUMHTTP:SCRIPT-INJ-VUL-33HTTP: SCRIPT-INJ Infection-33
MEDIUMHTTP:MAL-REDIRECT-VUL-34HTTP: MAL-REDIRECT Infection-34
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-35HTTP: SUSP-HDR-REDRCT Infection-35
MEDIUMHTTP:SCRIPT-INJ-VUL-36HTTP: SCRIPT-INJ Infection-36
MEDIUMHTTP:MAL-REDIRECT-VUL-37HTTP: MAL-REDIRECT Infection-37
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-38HTTP: SUSP-HDR-REDRCT Infection-38
MEDIUMHTTP:SCRIPT-INJ-VUL-39HTTP: SCRIPT-INJ Infection-39
MEDIUMHTTP:MAL-REDIRECT-VUL-40HTTP: MAL-REDIRECT Infection-40
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-41HTTP: SUSP-HDR-REDRCT Infection-41
MEDIUMHTTP:SCRIPT-INJ-VUL-42HTTP: SCRIPT-INJ Infection-42
MEDIUMHTTP:MAL-REDIRECT-VUL-43HTTP: MAL-REDIRECT Infection-43
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-44HTTP: SUSP-HDR-REDRCT Infection-44
MEDIUMHTTP:SCRIPT-INJ-VUL-45HTTP: SCRIPT-INJ Infection-45
MEDIUMHTTP:MAL-REDIRECT-VUL-46HTTP: MAL-REDIRECT Infection-46
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-47HTTP: SUSP-HDR-REDRCT Infection-47
MEDIUMHTTP:SCRIPT-INJ-VUL-48HTTP: SCRIPT-INJ Infection-48
MEDIUMHTTP:MAL-REDIRECT-VUL-49HTTP: MAL-REDIRECT Infection-49
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-50HTTP: SUSP-HDR-REDRCT Infection-50
MEDIUMHTTP:SCRIPT-INJ-VUL-51HTTP: SCRIPT-INJ Infection-51
MEDIUMHTTP:MAL-REDIRECT-VUL-52HTTP: MAL-REDIRECT Infection-52
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-53HTTP: SUSP-HDR-REDRCT Infection-53
MEDIUMHTTP:SCRIPT-INJ-VUL-54HTTP: SCRIPT-INJ Infection-54
MEDIUMHTTP:MAL-REDIRECT-VUL-55HTTP: MAL-REDIRECT Infection-55
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-56HTTP: SUSP-HDR-REDRCT Infection-56
MEDIUMHTTP:SCRIPT-INJ-VUL-57HTTP: SCRIPT-INJ Infection-57
MEDIUMHTTP:MAL-REDIRECT-VUL-58HTTP: MAL-REDIRECT Infection-58
MEDIUMHTTP:SUSP-HDR-REDRCT-VUL-59HTTP: SUSP-HDR-REDRCT Infection-59
MEDIUMHTTP:SCRIPT-INJ-VUL-60HTTP: SCRIPT-INJ Infection-60

2 updated signatures:

HIGHHTTP:STC:ADOBE:ACROBAT-GETICONHTTP: Adobe Acrobat JavaScript getIcon Method Buffer Overflow
HIGHHTTP:STC:ADVANTECH-WEBACCESSHTTP: Advantech WebAccess Dashboard uploadFile Arbitrary File Upload


Details of the signatures included within this bulletin:


HTTP:STC:ADOBE:ACROBAT-GETICON - HTTP: Adobe Acrobat JavaScript getIcon Method Buffer Overflow

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the Adobe Acrobat. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the Server.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141597, idp-5.1.110160603

References:

  • cve: CVE-2009-0927
  • bugtraq: 34169

Affected Products:

  • Adobe Acrobat Professional 7.0.7
  • Adobe Reader 7.0.3
  • Adobe Reader 7.0.4
  • Adobe Reader 7.0.5
  • Adobe Reader 7.0.6
  • Adobe Reader 7.0.7
  • Sun Solaris 10 Sparc
  • Adobe Acrobat Professional 7.0.0
  • SuSE SUSE Linux Enterprise Desktop 10 SP2
  • SuSE openSUSE 11.0
  • Nortel Networks Self-Service Peri Workstation
  • Adobe Reader 8.1.2 Security Update 1
  • Adobe Acrobat Professional 8.1.2 Security Update 1
  • Adobe Acrobat Professional 7.0.9
  • SuSE Linux Desktop 10
  • Nortel Networks Self-Service MPS 1000
  • Adobe Acrobat Professional 7.0.5
  • SuSE SUSE Linux Enterprise Desktop 11
  • Nortel Networks Self-Service Peri Application
  • Adobe Reader 8.1
  • Adobe Acrobat Professional 8.1
  • Adobe Acrobat Standard 8.1
  • Adobe Reader 7.0.9
  • Gentoo Linux
  • Adobe Acrobat Professional 7.1
  • Adobe Reader 7.1
  • Adobe Acrobat Standard 7.1
  • SuSE Novell Linux Desktop 9.0.0
  • SuSE openSUSE 10.3
  • Adobe Acrobat Standard 8.1.1
  • Adobe Acrobat Standard 8.1.2
  • Adobe Acrobat Professional 8.1.2
  • Adobe Reader 9
  • Adobe Acrobat Standard 9
  • Adobe Acrobat Professional 7.0.4
  • Adobe Reader 8.0
  • Adobe Acrobat Professional 8.0
  • Adobe Acrobat Standard 8.0
  • Adobe Acrobat Professional 9
  • SuSE openSUSE 11.1
  • Nortel Networks Self-Service - CCSS7
  • Adobe Reader 7.0.0
  • Adobe Reader 7.0.1
  • Adobe Acrobat Standard 7.0.0
  • Adobe Acrobat Standard 7.0.1
  • Adobe Acrobat Standard 7.0.2
  • Adobe Acrobat Standard 7.0.3
  • Adobe Acrobat Standard 7.0.4
  • Adobe Acrobat Standard 7.0.5
  • Adobe Acrobat Standard 7.0.8
  • Adobe Acrobat Standard 7.0.6
  • Adobe Acrobat Standard 7.0.7
  • Adobe Reader 7.0.2
  • Adobe Acrobat Professional 7.0.1
  • Adobe Acrobat Professional 7.0.2
  • Adobe Acrobat Professional 7.0.3
  • Adobe Reader 8.1.1
  • Adobe Acrobat Professional 8.1.1
  • Adobe Reader 7.0.8
  • Adobe Acrobat Professional 7.0.6
  • Adobe Reader 8.1.2
  • Adobe Acrobat Professional 7.0.8

HTTP:STC:HPE-LANG-INJ - HTTP: HPE Intelligent Management Center saveSelectedDevices Expression Language Injection

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in HPE Intelligent Management Center. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation results in the execution of arbitrary code under the security context of the SYSTEM user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141597, idp-5.1.110160603

References:

  • cve: CVE-2017-12490
  • url: https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03768en_us
  • cve: CVE-2017-12491
  • url: http://www.zerodayinitiative.com/advisories/zdi-17-655/

HTTP:TM-ISMS-RCE - HTTP: Trend Micro InterScan Messaging Security Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in Trend Micro InterScan Messaging Security. An attacker can exploit this issue to execute arbitrary code within the context of the application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141597, idp-5.1.110160603

References:

  • bugtraq: 96859
  • cve: CVE-2017-6398

Affected Products:

  • trendmicro interscan_messaging_security_virtual_appliance 9.1-1600

HTTP:STC:DL:MS-CVE-2017-8728-BO - HTTP: Microsoft Windows PDF Library Heap-based Buffer Overflow

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in Microsoft Windows PDF library. Successful exploitation could allow the attacker to execute arbitrary code under the security context of the target user.

Supported On:

srx-branch-12.1, isg-3.5.141652, mx-11.4, idp-5.1.110161014, idp-4.1.0, mx-16.1, vsrx-12.1, srx-17.3, vmx-17.4, vsrx-15.1, idp-5.1.110160603, j-series-9.5, isg-3.5.141597, srx-12.1

References:

  • cve: CVE-2017-8728
  • bugtraq: 100739

APP:MISC:RACER-BO - APP: Racer Remote Buffer Overflow

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Racer. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141597, idp-5.1.110160603

References:

  • cve: CVE-2007-4370
  • bugtraq: 25297

Affected Products:

  • racer 0.5.3

HTTP:SCRIPT-INJ-VUL-0 - HTTP: SCRIPT-INJ Infection-0

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-1 - HTTP: MAL-REDIRECT Infection-1

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-2 - HTTP: SUSP-HDR-REDRCT Infection-2

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-3 - HTTP: SCRIPT-INJ Infection-3

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-4 - HTTP: MAL-REDIRECT Infection-4

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-5 - HTTP: SUSP-HDR-REDRCT Infection-5

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-6 - HTTP: SCRIPT-INJ Infection-6

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-7 - HTTP: MAL-REDIRECT Infection-7

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-8 - HTTP: SUSP-HDR-REDRCT Infection-8

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-9 - HTTP: SCRIPT-INJ Infection-9

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-10 - HTTP: MAL-REDIRECT Infection-10

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-11 - HTTP: SUSP-HDR-REDRCT Infection-11

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-12 - HTTP: SCRIPT-INJ Infection-12

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-13 - HTTP: MAL-REDIRECT Infection-13

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-14 - HTTP: SUSP-HDR-REDRCT Infection-14

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-15 - HTTP: SCRIPT-INJ Infection-15

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-16 - HTTP: MAL-REDIRECT Infection-16

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-17 - HTTP: SUSP-HDR-REDRCT Infection-17

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-18 - HTTP: SCRIPT-INJ Infection-18

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-19 - HTTP: MAL-REDIRECT Infection-19

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-20 - HTTP: SUSP-HDR-REDRCT Infection-20

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-21 - HTTP: SCRIPT-INJ Infection-21

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-22 - HTTP: MAL-REDIRECT Infection-22

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-23 - HTTP: SUSP-HDR-REDRCT Infection-23

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-24 - HTTP: SCRIPT-INJ Infection-24

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-25 - HTTP: MAL-REDIRECT Infection-25

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-26 - HTTP: SUSP-HDR-REDRCT Infection-26

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-27 - HTTP: SCRIPT-INJ Infection-27

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-28 - HTTP: MAL-REDIRECT Infection-28

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-29 - HTTP: SUSP-HDR-REDRCT Infection-29

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-30 - HTTP: SCRIPT-INJ Infection-30

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-31 - HTTP: MAL-REDIRECT Infection-31

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-32 - HTTP: SUSP-HDR-REDRCT Infection-32

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-33 - HTTP: SCRIPT-INJ Infection-33

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-34 - HTTP: MAL-REDIRECT Infection-34

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-35 - HTTP: SUSP-HDR-REDRCT Infection-35

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-36 - HTTP: SCRIPT-INJ Infection-36

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-37 - HTTP: MAL-REDIRECT Infection-37

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-38 - HTTP: SUSP-HDR-REDRCT Infection-38

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-39 - HTTP: SCRIPT-INJ Infection-39

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-40 - HTTP: MAL-REDIRECT Infection-40

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-41 - HTTP: SUSP-HDR-REDRCT Infection-41

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-42 - HTTP: SCRIPT-INJ Infection-42

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-43 - HTTP: MAL-REDIRECT Infection-43

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-44 - HTTP: SUSP-HDR-REDRCT Infection-44

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-45 - HTTP: SCRIPT-INJ Infection-45

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-46 - HTTP: MAL-REDIRECT Infection-46

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-47 - HTTP: SUSP-HDR-REDRCT Infection-47

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-48 - HTTP: SCRIPT-INJ Infection-48

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-49 - HTTP: MAL-REDIRECT Infection-49

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-50 - HTTP: SUSP-HDR-REDRCT Infection-50

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-51 - HTTP: SCRIPT-INJ Infection-51

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-52 - HTTP: MAL-REDIRECT Infection-52

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-53 - HTTP: SUSP-HDR-REDRCT Infection-53

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-54 - HTTP: SCRIPT-INJ Infection-54

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-55 - HTTP: MAL-REDIRECT Infection-55

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-56 - HTTP: SUSP-HDR-REDRCT Infection-56

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-57 - HTTP: SCRIPT-INJ Infection-57

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-58 - HTTP: MAL-REDIRECT Infection-58

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-59 - HTTP: SUSP-HDR-REDRCT Infection-59

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-60 - HTTP: SCRIPT-INJ Infection-60

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-61 - HTTP: MAL-REDIRECT Infection-61

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-62 - HTTP: SUSP-HDR-REDRCT Infection-62

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-63 - HTTP: SCRIPT-INJ Infection-63

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-64 - HTTP: MAL-REDIRECT Infection-64

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-65 - HTTP: SUSP-HDR-REDRCT Infection-65

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-66 - HTTP: SCRIPT-INJ Infection-66

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-67 - HTTP: MAL-REDIRECT Infection-67

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-68 - HTTP: SUSP-HDR-REDRCT Infection-68

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-69 - HTTP: SCRIPT-INJ Infection-69

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-70 - HTTP: MAL-REDIRECT Infection-70

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-71 - HTTP: SUSP-HDR-REDRCT Infection-71

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-72 - HTTP: SCRIPT-INJ Infection-72

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-73 - HTTP: MAL-REDIRECT Infection-73

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-74 - HTTP: SUSP-HDR-REDRCT Infection-74

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SCRIPT-INJ-VUL-75 - HTTP: SCRIPT-INJ Infection-75

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:MAL-REDIRECT-VUL-76 - HTTP: MAL-REDIRECT Infection-76

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:SUSP-HDR-REDRCT-VUL-77 - HTTP: SUSP-HDR-REDRCT Infection-77

Severity: MEDIUM

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

srx-17.3, vsrx-15.1, srx-12.1


HTTP:STC:ADVANTECH-WEBACCESS - HTTP: Advantech WebAccess Dashboard uploadFile Arbitrary File Upload

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Dashboard component of Advantech WebAccess. Successful exploitation could allow the attacker to execute arbitrary code.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141597, idp-5.1.110160603

References:

  • cve: CVE-2016-0854

Affected Products:

  • advantech webaccess 8.0
Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out