Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Update Details

Security Intelligence Center
Print

Update #3038 (02/20/2018)

11 new signatures:

HIGHHTTP:STC:ADOBE:CVE-2018-4902RCEHTTP: Acrobat Reader CVE-018-4902 Code Execution
HIGHHTTP:STC:ADOBE:CVE-2018-4895RCEHTTP: Adobe Acrobat and Reader CVE-2018-4895 Remote Code Execution
HIGHHTTP:STC:ADOBE:CVE-2018-4884RCEHTTP: Adobe Reader CVE-2018-4884 Remote Code Execution
MEDIUMHTTP:STC:MS-EOT-INFO-DISHTTP: Microsoft Windows EOT Component Info Disclosure
HIGHHTTP:STC:ADOBE:CVE-2018-4878UAFHTTP: Adobe Flash Player CVE-2018-4878 Use After Free
HIGHHTTP:WORDPRESS-LS-DOSHTTP: WordPress load-scripts.php Denial Of Service
MEDIUMSSH:OPENSSH:SFTP-DOSSSH: OpenSSH SFTP Server Denial of Service
HIGHSSL:CISCO-ASA-WEBVPN-CESSL: Cisco Adaptive Security Appliance Webvpn XML Parser Double Free
HIGHHTTP:STC:ADOBE:CVE-2018-4890CEHTTP: Adobe Reader CVE-2018-4890 Arbitrary Code Execution
HIGHHTTP:STC:ADOBE:CVE-2018-4886RCEHTTP: Adobe Reader CVE-2018-4886 Remote Code Execution
HIGHHTTP:STC:ADOBE:CVE-2018-4879-CEHTTP: Adobe Reader CVE-2018-4879 Arbitrary Code Execution

342 updated signatures:

HIGHHTTP:PROXY:SQUID-PROXY-ESI-DOSHTTP: Squid Proxy ESI Response Processing Denial of Service
HIGHHTTP:MISC:HP-OPENVIEW-CEHTTP: HP OpenView Network Node Manager Arbitrary Code Execution
HIGHHTTP:PHP:PHPSECUREPAGE-RFI5HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion5
MEDIUMHTTP:STC:STREAM:WINAMP-META-OFHTTP: Nullsoft Winamp Ultravox Streaming Metadata Parsing Overflow
HIGHHTTP:PHP:WP-MRKPLC-UPLOADIFYHTTP: WP Marketplace Plugin uploadify.php Arbitrary File Upload
HIGHHTTP:PHP:WP-DOUPLOAD-FUHTTP: WordPress Member Conversation Plugin doupload.php Arbitrary File Upload
HIGHHTTP:STC:STREAM:QT-MPEG-PADHTTP: Apple QuickTime MPEG Stream Padding Buffer Overflow
MEDIUMHTTP:IIS:WEBDAV:XML-HANDLER-DOSHTTP: Microsoft WebDAV XML Message Handler Denial of Service
HIGHHTTP:LEXMARK-LIB-FILE-DIR-TRAVHTTP: Lexmark Markvision LibraryFileUploadServlet Directory Traversal
CRITICALAPP:HP-PROCURVE-FILE-UPLOADAPP: HP ProCurve Manager SNAC UpdateCertificatesServlet Code Execution (HTTP)
MEDIUMHTTP:ADOBE-ROBOHELP-FILE-UPLOA2HTTP: Adobe RoboHelp Server Arbitrary File Upload and Execute2
HIGHHTTP:PHP:YABBSE-PKG-EXEC10HTTP: YabbSE Packages.php Code Execution10
HIGHHTTP:NOVELL-NETIQ-MOD-POLBYPASHTTP: Novell NetIQ Privileged User Manager modifyAccounts Policy Bypass
CRITICALAPP:HP-PROCRVE-SNAC-FILE-UPLDAPP: HP ProCurve Manager SNAC UpdateDomainControllerServlet Code Execution
HIGHHTTP:MISC:MS-USERS-PWD-INFO-DI1HTTP: Microsoft FrontPage Extensions File Information Disclosure1
HIGHHTTP:INFO-LEAK:WFCHAT10HTTP: WFChat Information Disclosure10
MEDIUMHTTP:NGINX-RQST-URI-SECBYPASS3HTTP: Nginx Request URI Verification Security Bypass3
HIGHHTTP:STC:SAFARI:X-MAN-PAGE-CE10HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 10
HIGHHTTP:PHP:PHPSECUREPAGE-RFI10HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion10
HIGHHTTP:STC:DL:XLS-SERIES10HTTP: Microsoft Excel Malformed Series Record Remote Code Execution10
HIGHHTTP:STC:ADOBE:READER-PLUGIN10HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption10
HIGHHTTP:SQL:INJ:WP-AJAX-CATEGORY10HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 10
HIGHHTTP:STC:CHROME:TABLE-CSS-MC2HTTP: Google Chrome Table Webkit Appearance CSS Property Memory Corruption2
HIGHHTTP:SQL:INJ:WP-AJAX-CATEGORY11HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 11
HIGHAPP:MCAFEE-WR-JBOSS-RCEAPP: McAfee Web Reporter JBoss EJBInvokerServlet Marshalled Object Remote Code Execution
HIGHHTTP:STC:DL:GIMP-XWD-BO1HTTP: GIMP XWD File Handling Stack Buffer Overflow1
HIGHHTTP:STC:DL:GIMP-XWD-BO2HTTP: GIMP XWD File Handling Stack Buffer Overflow2
HIGHAPP:AVAYA-CCRWEBCLIENT-RCEAPP: Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Code Execution
HIGHHTTP:HP-SITESCOPE-INF-DISCHTTP: HP SiteScope Log Analyzer Information Disclosure
HIGHAPP:HP-PM-EXP-DATA-LOGSAPP: HP Power Manager formExportDataLogs Buffer Overflow
HIGHAPP:VMWARE-ISAPI-DOSAPP: VMware Server ISAPI Extension Remote Denial Of Service
CRITICALHTTP:APACHE:MOD-ISAPI-RCEHTTP: Apache HTTP Server mod_isapi Dangling Pointer Remote Code Execution
HIGHHTTP:NOVELL-NETIQ-EVAL-POLBYPASHTTP: Novell NetIQ Privileged User Manager Eval Policy Bypass
HIGHHTTP:STC:ADOBE:READER-PLUGIN3HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption3
HIGHAPP:MISC:HP-SITESCOPE-CEAPP: HP SiteScope issueSiebelCmd SOAP Request Handling
MEDIUMHTTP:STC:DL:ARJ-BO1HTTP: NOD32 AntiVirus ARJ Archive Handling Buffer Overflow1
MEDIUMAPP:MISC:HP-SSC-APIMONITORIMPLAPP: HP SiteScope SOAP Call APIMonitorImpl Security Bypass
HIGHHTTP:STC:ADOBE:READER-PLUGIN6HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption6
HIGHHTTP:CGI:OFFICESCAN-CGI-BOHTTP: Trend Micro OfficeScan Multiple CGI Modules HTTP Form Processing Buffer Overflow
HIGHHTTP:INFO-LEAK:WFCHAT1HTTP: WFChat Information Disclosure1
MEDIUMHTTP:DIR:APJS-PORTAL-DIRTRAVHTTP: Apache Jetspeed Portal Site Manager ZIP File Upload Directory Traversal
HIGHAPP:REAL:RAM-FILE-OFAPP: RealMedia RAM File Processing Buffer Overflow
HIGHHTTP:CA-XOSOFT-XOSOAPHTTP: Computer Associates XOsoft xosoapapi.asmx Buffer Overflow
HIGHHTTP:STC:IE:CSRSS-HE-MSGHTTP: Microsoft Windows CSRSS HardError Message Box Vulnerability
MEDIUMAPP:HP-DATA-PROTECTOR-GET-SQLAPP: HP Data Protector Multiple Products GetPolicies SQL Injection
MEDIUMAPP:HP-DATA-PROTECTOR-REQ-SQLAPP: HP Data Protector Multiple Products RequestCopy SQL Injection
MEDIUMAPP:HP-DATA-PROTECTOR-FIN-SQLAPP: HP Data Protector Multiple Products FinishedCopy SQL Injection
HIGHHTTP:STC:SWF:SWAVE-TSAC-CHUNKHTTP: Adobe Shockwave tSAC Chunk Invalid Seek Memory Corruption
HIGHAPP:CITRIX:XENAPP-XML-RCEAPP: Citrix XenApp and XenDesktop XML Service Interface Remote Code Execution
HIGHAPP:MCAFEE-EPOLICY-XMLAPP: McAfee ePolicy Orchestrator XML External Entity Injection
INFOHTTP:AUDIT:PDF-SCIIHEXDECODEHTTP: Adobe PDF SCIIHexDecode Evasion Method Detection
CRITICALHTTP:IIS:SHAREPOINT-CONVERTHTTP: Microsoft Sharepoint Document Conversion Remote Code Execution
HIGHHTTP:STC:IMG:XP-MAL-TIFFHTTP: Microsoft Office XP Malicious TIFF
MEDIUMHTTP:MICROSOFT-WORKS-WKSSS-BO1HTTP: Microsoft Works wksss Buffer Overflow1
HIGHHTTP:XSS:FRONTPAGE-EXTHTTP: FrontPage Server Extensions XSS
MEDIUMHTTP:SPRING-XMLENTITY-INFODISC1HTTP: SpringSource Spring Framework XML External Entity Parsing Information Disclosure1
HIGHHTTP:STC:IE:UNICODE-EVSN-UTF-1HTTP: Unicode Evasion Detected 1
HIGHHTTP:DIR:ORACLE-INFO-DISCOVERYHTTP: Oracle Endeca Information Discovery Integrator ETL Server RenameFile Directory Traversal
HIGHAPP:NOVELL:IMANAGER-FILE-UPLOADAPP: Novell iManager getMultiPartParameters Unauthorized File Upload
HIGHAPP:ZLIB-COMPRES-LIB-DOS-2APP: Zlib Compression Library Denial Of Service (2)
HIGHHTTP:HPE-ACCESS-DESERIALIZATIONHTTP: HPE Intelligent Management Center accessMgrServlet Insecure Deserialization
MEDIUMHTTP:ORACLE:EVNTPRO-DIR-TRAVHTTP:Oracle Event Processing FileUploadServlet Directory Traversal
HIGHHTTP:STC:DL:WNDPROC-INFO-DISC1HTTP: Microsoft wndproc Credentials Disclosure1
HIGHHTTP:STC:DOTNET-BUFF-ALLOC1HTTP: .NET Framework Buffer Allocation Vulnerability1
HIGHHTTP:MS-MDAC-RCE1HTTP: Microsoft MDAC Components Remote Code Execution1
HIGHHTTP:INFO-LEAK:MS-VISIO-XML1HTTP: Microsoft Visio Crafted XML File Information Disclosure1
HIGHHTTP:STC:MS-OFFICE-WRITEAV-RCE1HTTP: Microsoft Office OneNote File Processing Remote Code Execution1
HIGHHTTP:STC:SAFARI:X-MAN-PAGE-RCE1HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 1
HIGHHTTP:INFO-LEAK:DOT-NET-CODE1HTTP: Microsoft .NET Framework Code Access Security Info Disclosure Vulnerability1
HIGHHTTP:STC:DL:XLS-SERIES1HTTP: Microsoft Excel Malformed Series Record Remote Code Execution1
HIGHHTTP:STC:DL:PPT-SLIDEATOM1HTTP: Microsoft PowerPoint SlideAtom Vulnerability1
MEDIUMHTTP:ADOBE-ROBOHELP-FILE-UPLOA3HTTP: Adobe RoboHelp Server Arbitrary File Upload and Execute3
HIGHHTTP:INFO-LEAK:WFCHAT11HTTP: WFChat Information Disclosure11
MEDIUMHTTP:KASPERSKY-URI-PARSING-DOS3HTTP: Kaspersky Products URI Parsing Denial of Service3
HIGHHTTP:STC:ACTIVEX:ICONICS-WEBHM1HTTP: ICONICS IcoSetServer Unsafe ActiveX Control1
MEDIUMHTTP:PFSENSE-ZONE-CSS3HTTP: pfSense WebGUI Zone Parameter Cross-Site Scripting3
HIGHHTTP:PHP:YABBSE-PKG-EXEC11HTTP: YabbSE Packages.php Code Execution11
HIGHHTTP:TOMCAT:SERVLET-DEVICE-DOS1HTTP: Apache Tomcat Device Servlet Request DoS1
HIGHHTTP:PHP:PHPSECUREPAGE-RFI11HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion11
HIGHHTTP:STC:ADOBE:READER-PLUGIN11HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption11
HIGHHTTP:STC:DOTNET-BUFF-ALLOC11HTTP: .NET Framework Buffer Allocation Vulnerability11
HIGHHTTP:STC:CHROME:TABLE-CSS-MC3HTTP: Google Chrome Table Webkit Appearance CSS Property Memory Corruption3
HIGHHTTP:STC:DL:XLS-SERIES11HTTP: Microsoft Excel Malformed Series Record Remote Code Execution11
HIGHHTTP:STC:SAFARI:X-MAN-PAGE-CE11HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 11
HIGHHTTP:STC:MOZILLA:FF-IMG-TAG-DO1HTTP: Mozilla Firefox IMG Tag Parsing Denial of Service1
HIGHHTTP:TM-IWSVA-LS-CIHTTP: Trend Micro IWSVA LogSettingHandler doPostMountDevice Command Injection
HIGHHTTP:STC:WIN-CCL-BOFHTTP:Microsoft Windows Common Control Library Vulnerability
HIGHHTTP:PHP:HORDE-HREF-BACKDOOR1HTTP: Horde Href Backdoor1
HIGHHTTP:STC:ACTIVEX:INDUSOFT-ISSY1HTTP: InduSoft Web Studio ISSymbol Unsafe ActiveX Control1
HIGHHTTP:PHP:YABBSE-PKG-EXEC1HTTP: YabbSE Packages.php Code Execution1
HIGHHTTP:INFO:HTML5-CONTENT1HTTP: HTML Version 5 Content1
HIGHHTTP:STC:DL:SWF-ACTIONPUSH1HTTP: Adobe Flash Player ActionScript ActionPush Memory Corruption 1
HIGHHTTP:EXPLOIT:D-LINK-ADMIN-PW1HTTP: D-Link Admin Password Probe1
HIGHHTTP:STC:SCRIPT:DOUBLE-BACKSLA1HTTP: JavaScript Double BackSlash Hex Obfuscated Heap Spray1
MEDIUMAPP:MISC:HP-SITESCOPE-LOADFILEAPP: HP SiteScope loadFileContent SOAP Request Information Disclosure
HIGHHTTP:STC:IE:DESIGNMODE-INFO1HTTP: Microsoft Internet Explorer DesignMode Information Disclosure1
HIGHAPP:NOVELL:IPRINT-ATTRIB-BOAPP: Novell iPrint Server attributes-natural-language Buffer Overflow
HIGHHTTP:WIRESHARK-MPEG-BOF1HTTP: Wireshark MPEG Dissector Stack Buffer Overflow1
HIGHHTTP:SQL:INJ:JOOMLA-COM-JCE1HTTP: Joomla JCE Component Itemid Parameter SQL Injection1
HIGHHTTP:STC:ADOBE:READER-PLUGIN1HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption1
HIGHHTTP:STC:CLSID:ACTIVEX:NESSCAN1HTTP: Nessus Vulnerability Scanner 3.0.6 ActiveX Vulnerability1
HIGHHTTP:INFO:FACEBOOK1HTTP: Facebook Access1
HIGHHTTP:STC:CHROME:TABLE-CSS-MC1HTTP: Google Chrome Table Webkit Appearance CSS Property Memory Corruption1
HIGHHTTP:PHP:PHPSECUREPAGE-RFI1HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion1
HIGHHTTP:CISCO:VOIP:PORT-INFO-DOS1HTTP: Cisco VoIP Phone PortInformation DOS1
MEDIUMHTTP:INFO-LEAK:CA-TOTAL-DEFENSEHTTP: CA Total Defense Suite UNCWS getDBConfigSettings Credential Information Disclosure
HIGHHTTP:SQL:INJ:WP-AJAX-CATEGORY1HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection1
HIGHHTTP:STC:IMG:OFFICE-FLASHPIX1HTTP: Microsoft Office Malicious FlashPix Graphics File1
HIGHAPP:LANDESK-THINKMGT-DIRTRVRSALAPP: LANDesk ThinkManagement Suite SetTaskLogByFile Directory Traversal
HIGHHTTP:PHP:VS-NEWS-RFI1HTTP: VirtualSystem VS-News-System Show_News_Inc.PHP Remote File Inclusion1
HIGHHTTP:STC:IE:SETCAPTURE-UAF1HTTP: Microsoft Internet Explorer SetCapture Use After Free1
HIGHHTTP:STC:IE:MDAO-RCE1HTTP: Microsoft Data Access Object Memory Corruption Remote Code Execution1
HIGHHTTP:STC:DL:HEX-WORKSHP-CMAP-C1HTTP: BreakPoint Software Hex Workshop ".CMAP" File Arbitrary Code Execution1
HIGHHTTP:STC:DL:OPEN-TYPE-RCE11HTTP: Open Type Font Parsing Remote Code Execution1
HIGHHTTP:STC:ADOBE:CVE-2015-3122-C1HTTP: Adobe Flash CVE-2015-3122 Remote Code Execution1
HIGHHTTP:STC:SCRIPT:GARBLE-JS-OBFU1HTTP: Garble Javascript Obfuscation Detected1
HIGHHTTP:STC:CHROME:JS-MSGBOX-DOS1HTTP: Google Chrome Java Script Message Box Denial of Service1
HIGHHTTP:STC:ADOBE:CVE-2015-5133-C1HTTP: Adobe Flash CVE-2015-5133 Remote Code Execution1
HIGHHTTP:STC:IE:CVE-2014-4134-MC1HTTP: Microsoft Internet Explorer CVE-2014-4134 Memory Corruption1
HIGHHTTP:STC:IE:CVE-2014-4086-UAF1HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4086)1
HIGHHTTP:STC:IE:CVE-2014-0267-MC1HTTP: Microsoft Internet Explorer CVE-2014-0267 Memory Corruption1
HIGHHTTP:STC:IE:MHTML-HREF-OF1HTTP: MHTML HREF Overflow1
HIGHHTTP:STC:IE:CVE-2014-4126-MC1HTTP: Microsoft Internet Explorer CVE-2014-4126 Memory Corruption1
HIGHHTTP:STC:IE:HTML-HELP-ZONE-BP1HTTP: Internet Explorer HTML Help Zone Bypass1
HIGHHTTP:STC:IE:OBJECT-TAG-XML1HTTP: Microsoft Internet Explorer Object Tag XML RCE1
HIGHHTTP:STC:IE:ONBEFORECOPY-UAF1HTTP: Microsoft Internet Explorer onBeforeCopy Use After Free1
HIGHHTTP:STC:IE:CVE-2014-4140-CE1HTTP: Microsoft Internet Explorer CVE-2014-4140 Arbitrary Code Execution1
HIGHHTTP:STC:SWF:OPENTYPE-FONT-OF1HTTP: Adobe Flash Player OpenType Font Parsing Integer Overflow1
HIGHHTTP:STC:SWF:COPYRAWDATATO1HTTP: Adobe Flash Player copyRawDataTo Out of Bounds Array Indexing1
MEDIUMHTTP:STC:STREAM:VLC-REALINDEX1HTTP: VideoLAN VLC real.c ReadRealIndex Real Demuxer Integer Overflow1
MEDIUMHTTP:STC:STREAM:QT-MOV-FILE-BO1HTTP: Apple QuickTime Movie File Clipping Region Handling Heap Buffer Overflow1
MEDIUMHTTP:STC:STREAM:FLASH-MEMORY1HTTP: Macromedia Flash Player Improper Memory Access1
MEDIUMHTTP:STC:STREAM:DIRECTSHOW-MJP1HTTP: Microsoft Windows MJPEG Media Decompression Code Execution1
MEDIUMHTTP:STC:SCHNEIDER-CFG-FILE-BO1HTTP: Schneider Electric VAMPSET CFG File Handling Buffer Overflow 1
MEDIUMHTTP:STC:OLE-SHELL1HTTP: Malicious OLE Object in Office Document1
MEDIUMHTTP:STC:MOZILLA:OGG-VORBIS1HTTP: Multiple Mozilla Products Ogg Vorbis Decoding Memory Corruption1
MEDIUMHTTP:STC:MOZILLA:NNTP-URL1HTTP: Mozilla NNTP URL Handling Buffer Overflow1
MEDIUMHTTP:STC:JAVA:PRVDR-SKLTON-SB1HTTP: Oracle Java ProviderSkeleton Sandbox Bypass1
MEDIUMHTTP:STC:JAVA:GIF-MEMCORRUPT1HTTP: Sun Java GIF File Handling Memory Corruption1
HIGHHTTP:DOS:DRUPAL-XML-RPC-IEEHTTP: Drupal Core XML-RPC Endpoint Internal Entity Expansion Denial of Service
MEDIUMHTTP:STC:IMG:OFFICE-FLASHPIX21HTTP: Microsoft Office Malicious FlashPix Image (2)1
MEDIUMHTTP:STC:IMG:KODAK-TIFF1HTTP: Microsoft Windows Kodak Image Viewer Code Execution1
MEDIUMHTTP:STC:IMG:JPEG-WIDTH-OF1HTTP: Internet Explorer Overlarge JPEG (Width)1
MEDIUMHTTP:STC:IMG:ICO-SIZE-OF1HTTP: Overlarge ICO Size Parameter1
MEDIUMHTTP:STC:IE:XML-HANDLE-EXEC1HTTP: Internet Explorer XML Handling Exploit Attempt1
MEDIUMHTTP:STC:IE:URL-FILE-BOF1HTTP: Microsoft Windows Explorer Invalid URL File1
MEDIUMHTTP:STC:IE:SAMEID-RCE1HTTP: Microsoft Internet Explorer Same ID Property Remote Code Execution1
MEDIUMHTTP:STC:IE:PRINT-PREVIEW-CE1HTTP: Microsoft Internet Explorer Print Preview Handling Command Execution1
MEDIUMHTTP:STC:DL:WORD-REC-LEN-OF1HTTP: Microsoft Word Record Parsing Length Field Overflow1
HIGHHTTP:STC:DL:APPLE-QT-RNET-OFHTTP: Apple QuickTime rnet Box Parsing Heap Buffer Overflow
MEDIUMHTTP:STC:DL:WMP-DVR-MS1HTTP: Microsoft Windows Media Player DVR-MS File Remote Code Execution1
MEDIUMHTTP:STC:DL:VLC-TY-BO1HTTP: VideoLAN VLC Media Player TY Processing Buffer Overflow1
MEDIUMHTTP:STC:DL:VISIO-VSD-MEM1HTTP: Microsoft Visio VSD File Format Memory Corruption Remote Code Execution1
MEDIUMHTTP:STC:DL:VISIO-OBJ-CONFUSIO1HTTP: Microsoft Visio Object Type Confusion Remote Code Execution1
MEDIUMHTTP:STC:DL:SOPHOS-ZIPDOS1HTTP: Sophos Anti-Virus Zip File Handling Denial of Service1
MEDIUMHTTP:STC:DL:SANDWORM-RCE1HTTP: Microsoft Office SandWorm Remote Code Execution1
MEDIUMHTTP:STC:DL:REALPLAYER-SWF-BO1HTTP: RealPlayer SWF Frame Handling Buffer Overflow1
MEDIUMHTTP:STC:DL:QUICKTIME-QTVR-BOF1HTTP: Apple QuickTime QTVR QTVRStringAtom Parsing Buffer Overflow (CVE-2012-0667)1
MEDIUMHTTP:STC:DL:QT-STSC-ATOM-MC1HTTP: Microsoft DirectShow QuickTime stsc Atom Parsing Memory Corruption1
MEDIUMHTTP:STC:DL:QT-PDAT1HTTP: Apple QuickTime PDAT Atom Parsing Buffer Overflow1
MEDIUMHTTP:STC:WIN-SHELLHNDL1HTTP: Microsoft Windows Shell Handler URL Validation1
MEDIUMHTTP:STC:DL:QT-JVTCOMPENCODE1HTTP: Apple QuickTime MOV File JVTCompEncodeFrame Heap Overflow1
MEDIUMHTTP:STC:DL:QT-CRGN-ATOM1HTTP: Apple QuickTime crgn Atom Parsing Memory Corruption1
MEDIUMHTTP:STC:DL:QT-COLOR-ATOM1HTTP: Apple QuickTime Color Table Atom Movie File Handling Heap Corruption1
MEDIUMHTTP:STC:DL:PPT-VIEWER-MEMALLO1HTTP: Microsoft PowerPoint Viewer Memory Allocation Code Execution1
MEDIUMHTTP:STC:DL:PPT-TEXTBYTESATM-B1HTTP: Microsoft PowerPoint Viewer TextBytesAtom Stack Buffer Overflow1
MEDIUMHTTP:STC:DL:PPT-PP7-MC1HTTP: Microsoft Office PowerPoint PP7 File Handling Memory Corruption1
MEDIUMHTTP:STC:DL:PPT-OFFICEART1HTTP: Microsoft Powerpoint OfficeArtClient Remote Code Execution1
HIGHHTTP:DOS:DRUPAL-XMLRPC-TAGSHTTP: Drupal Core XML-RPC Endpoint Tags Denial of Service
MEDIUMHTTP:STC:DL:OTF-DOS1HTTP: Microsoft Windows OpenType Font (OTF) Denial of Service1
MEDIUMHTTP:STC:DL:OFFICE-PICT-MC1HTTP: Microsoft Office PICT Filter Invalid Length Memory Corruption1
MEDIUMHTTP:STC:DL:OFF-GDI-HOF1HTTP: Microsoft Office GDI+ Heap Overflow Vulnerability 1
MEDIUMHTTP:STC:DL:NETOP-DWS-BOF1HTTP: Netop Remote Control dws File Buffer Overflow1
MEDIUMHTTP:STC:DL:MS-PUB-RCE1HTTP: Microsoft Publisher Pubconv.dll Function Pointer Overwrite1
HIGHAPP:ORACLE:VIRTUAL-AGENT-CMDINJAPP: Oracle Virtual Server Agent Command Injection
MEDIUMHTTP:STC:DL:MS-OFFICE-STRING1HTTP: Microsoft Office Malformed String Parsing Code Execution1
MEDIUMHTTP:STC:DL:MS-OBJ-PACKAGER-RC1HTTP: Microsoft Windows Object Packager ClickOnce Object Handling Code Execution1
MEDIUMHTTP:STC:DL:MSHTML-HELP1HTTP: Microsoft HTML Help '.chm' File Stack Buffer Overflow Vulnerability1
MEDIUMHTTP:STC:DL:MSDOTNET-FUNC-PTR1HTTP: Microsoft .NET Framework Improper Execution of Function Pointer1
MEDIUMHTTP:STC:DL:MS-DOC-STREAM-CE1HTTP: Microsoft Word Document Stream Handling Code Execution1
MEDIUMHTTP:STC:DL:MAL-MEDIA-RCE1HTTP: Malformed Media Files Processing Remote Code Execution1
MEDIUMHTTP:STC:DL:LIBXML2-ENTRY-NAME1HTTP: libxml2 XML File Processing Long Entity Name Buffer Overflow1
MEDIUMHTTP:STC:DL:FAX-EDITOR-RCE1HTTP: Fax Cover Page Editor Remote Code Execution1
MEDIUMHTTP:STC:DL:EMF-EMR-INT1HTTP: OpenOffice EMF File EMR Record Parsing Integer Overflow1
MEDIUMHTTP:STC:DL:EICAR1HTTP: EICAR Antivirus Test File Download1
MEDIUMHTTP:STC:DL:DS-ATOM-TABLE1HTTP: Microsoft DirectShow Remote Code Execution1
MEDIUMHTTP:STC:DL:CAB-VULNS1HTTP: Cab File Multiple Vulnerabilities1
MEDIUMHTTP:STC:DL:ASF-DF1HTTP: ASF Header Parsing Invalid Free1
MEDIUMHTTP:XSS:REDHAT-JBOSS-XSSHTTP: Red Hat JBoss BPM Suite BRMS Tasks List Cross-Site Scripting
MEDIUMHTTP:STC:DL:APPLE-QT-MOV-DOS1HTTP: Apple QuickTime Player MOV File Handling Denial of Service1
MEDIUMHTTP:STC:DL:APPLE-QT-IMAGE-MC1HTTP: Apple QuickTime Image Description Atom Sign Extension Memory Corruption1
MEDIUMHTTP:STC:DL:APPLE-QT-H264-BOF1HTTP: Apple QuickTime H.264 Crafted Movie Buffer Overflow1
HIGHHTTP:NOVELL:ZENWORKS-RTRLET-COMHTTP: Novell ZENWorks Asset Management 'rtrlet' Component Remote Code Execution
MEDIUMHTTP:STC:DL:ACE-BO1HTTP: Avast! Antivirus ACE File Handling Buffer Overflow1
MEDIUMHTTP:STC:ACTIVEX:MS-AGENT-LIB1HTTP: Microsoft Agent Unsafe ActiveX Control1
MEDIUMHTTP:STC:IE:MHTML-REDIR1HTTP: Internet Explorer MHTML Redirection Information Disclosure1
MEDIUMHTTP:STC:IE:MAL-JPEG1HTTP: Microsoft Internet Explorer Malformed JPEG File1
MEDIUMHTTP:STC:IE:EOT-WEBFONTS-DL1HTTP: Internet Explorer WebFonts File Download1
MEDIUMHTTP:STC:DL:XLS-SERIES-TYPE-RC1HTTP: Microsoft Excel Series Record Parsing Type Mismatch Remote Code Execution1
MEDIUMHTTP:STC:DL:XLS-RTWINDOW1HTTP: Microsoft Excel rtWindow1 Record Handling Code Execution1
MEDIUMHTTP:STC:DL:XLS-INT-OR1HTTP: Microsoft Excel Integer Overrun Vulnerability1
MEDIUMHTTP:STC:DL:XLS-FRTWRAPPER1HTTP: Microsoft Excel FRTWrapper Record Buffer Overflow1
MEDIUMHTTP:SQL:INJ:TIVOLI-USER-UPDAT1HTTP: IBM Tivoli Provisioning Manager Express User.updateUserValue SQL Injection1
MEDIUMHTTP:ORACLE:OUTSIDEIN-MET-BOF1HTTP: Oracle Outside In OS 2 Metafile Parser Stack Buffer Overflow1
MEDIUMHTTP:MISC:AV-INVALID-CHKSUM1HTTP: Multiple AV Vendor Invalid Archive Checksum Bypass1
MEDIUMHTTP:EXPLOIT:MAL-LNK1HTTP: Malformed Microsoft LNK File Download1
MEDIUMHTTP:APACHE:MOD-ISAPI-RCE1HTTP: Apache HTTP Server mod_isapi Dangling Pointer Remote Code Execution1
MEDIUMHTTP:STC:ADOBE:WRTE-WAT-WHRE-C1HTTP: Adobe Flash Player Shader Object Processing Remote Code Execution1
MEDIUMHTTP:STC:ADOBE:TEXTLINE-OB-CE1HTTP: Adobe Flash TextLine OpaqueBackground Property Remote Code Execution1
MEDIUMHTTP:STC:ADOBE:SWF-INVALID-OBF1HTTP: Adobe Flash Player Invalid Object Reference Code Execution1
MEDIUMHTTP:STC:ADOBE:SWF-DMNMEM-CP1HTTP: Adobe Flash Player CVE-2015-0311 DomainMemory Use-after-Free1
MEDIUMHTTP:STC:ADOBE:READER-ICC-RCE1HTTP: Adobe Acrobat Reader ICC Stream Remote Code Execution (APSB10-21)1
MEDIUMHTTP:STC:ADOBE:PDF-BITDEF-OF1HTTP: BitDefender Antivirus PDF Processing Memory Corruption1
HIGHHTTP:MISC:MANAGENGINE-EVNTLG-CEHTTP: ManageEngine EventLog Analyzer agentUpload Directory Traversal
HIGHHTTP:INFO-LEAK:WFCHAT2HTTP: WFChat Information Disclosure2
HIGHHTTP:INFO-LEAK:WFCHAT3HTTP: WFChat Information Disclosure3
HIGHHTTP:INFO-LEAK:WFCHAT4HTTP: WFChat Information Disclosure4
HIGHHTTP:INFO-LEAK:WFCHAT5HTTP: WFChat Information Disclosure5
HIGHHTTP:INFO-LEAK:WFCHAT6HTTP: WFChat Information Disclosure6
HIGHHTTP:INFO-LEAK:WFCHAT7HTTP: WFChat Information Disclosure7
HIGHHTTP:INFO-LEAK:WFCHAT8HTTP: WFChat Information Disclosure8
HIGHHTTP:INFO-LEAK:WFCHAT9HTTP: WFChat Information Disclosure9
HIGHHTTP:PHP:PHPSECUREPAGE-RFI2HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion2
HIGHHTTP:PHP:PHPSECUREPAGE-RFI3HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion3
HIGHHTTP:PHP:PHPSECUREPAGE-RFI4HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion4
HIGHHTTP:STC:DOTNET-BUFF-ALLOC10HTTP: .NET Framework Buffer Allocation Vulnerability10
HIGHHTTP:PHP:PHPSECUREPAGE-RFI6HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion6
HIGHHTTP:PHP:PHPSECUREPAGE-RFI7HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion7
HIGHHTTP:PHP:PHPSECUREPAGE-RFI8HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion8
HIGHHTTP:PHP:PHPSECUREPAGE-RFI9HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion9
HIGHHTTP:STC:IE:COMPRESSED-URLHTTP: Microsoft Internet Explorer Compressed Content URL Heap Overflow
HIGHHTTP:MISC:ENDIAN-PRX-CMDEXECHTTP: Endian Firewall Proxy Password Change Command Execution
HIGHHTTP:SQL:INJ:WP-AJAX-CATEGORY2HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 2
HIGHHTTP:PHP:YABBSE-PKG-EXEC2HTTP: YabbSE Packages.php Code Execution2
HIGHHTTP:PHP:YABBSE-PKG-EXEC3HTTP: YabbSE Packages.php Code Execution3
HIGHHTTP:PHP:YABBSE-PKG-EXEC4HTTP: YabbSE Packages.php Code Execution4
HIGHHTTP:PHP:YABBSE-PKG-EXEC5HTTP: YabbSE Packages.php Code Execution5
HIGHHTTP:PHP:YABBSE-PKG-EXEC6HTTP: YabbSE Packages.php Code Execution6
HIGHHTTP:PHP:YABBSE-PKG-EXEC7HTTP: YabbSE Packages.php Code Execution7
HIGHHTTP:PHP:YABBSE-PKG-EXEC8HTTP: YabbSE Packages.php Code Execution8
HIGHHTTP:PHP:YABBSE-PKG-EXEC9HTTP: YabbSE Packages.php Code Execution9
HIGHHTTP:SQL:INJ:WP-AJAX-CATEGORY3HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 3
HIGHHTTP:SQL:INJ:WP-AJAX-CATEGORY4HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 4
HIGHHTTP:SQL:INJ:WP-AJAX-CATEGORY5HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 5
HIGHHTTP:SQL:INJ:WP-AJAX-CATEGORY6HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 6
HIGHHTTP:SQL:INJ:WP-AJAX-CATEGORY7HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 7
HIGHHTTP:SQL:INJ:WP-AJAX-CATEGORY8HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 8
HIGHHTTP:SQL:INJ:WP-AJAX-CATEGORY9HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 9
HIGHHTTP:STC:SAFARI:X-MAN-PAGE-RCE2HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 2
HIGHHTTP:STC:SAFARI:X-MAN-PAGE-RCE3HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 3
HIGHHTTP:STC:SAFARI:X-MAN-PAGE-RCE4HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 4
HIGHHTTP:STC:SAFARI:X-MAN-PAGE-RCE5HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 5
HIGHHTTP:STC:SAFARI:X-MAN-PAGE-RCE6HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 6
HIGHHTTP:STC:SAFARI:X-MAN-PAGE-RCE7HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 7
HIGHHTTP:STC:SAFARI:X-MAN-PAGE-RCE8HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 8
HIGHHTTP:STC:SAFARI:X-MAN-PAGE-RCE9HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 9
HIGHHTTP:STC:ADOBE:READER-PLUGIN2HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption2
HIGHHTTP:DIR:VISUALMINING-NETCHARTSHTTP: Visual Mining NetCharts Server File Upload Directory Traversal
HIGHHTTP:STC:ADOBE:READER-PLUGIN4HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption4
HIGHHTTP:STC:ADOBE:READER-PLUGIN5HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption5
HIGHAPP:ORACLE:GOLDENGATE-SOAP-OFAPP: Oracle GoldenGate Veridata Server XML SOAP Request Buffer Overflow
HIGHHTTP:STC:ADOBE:READER-PLUGIN7HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption7
HIGHHTTP:STC:ADOBE:READER-PLUGIN8HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption8
HIGHHTTP:STC:ADOBE:READER-PLUGIN9HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption9
HIGHHTTP:STC:DL:XLS-SERIES2HTTP: Microsoft Excel Malformed Series Record Remote Code Execution2
HIGHHTTP:STC:DL:XLS-SERIES3HTTP: Microsoft Excel Malformed Series Record Remote Code Execution3
HIGHHTTP:STC:DL:XLS-SERIES4HTTP: Microsoft Excel Malformed Series Record Remote Code Execution4
HIGHHTTP:STC:DL:XLS-SERIES5HTTP: Microsoft Excel Malformed Series Record Remote Code Execution5
HIGHHTTP:STC:DL:XLS-SERIES6HTTP: Microsoft Excel Malformed Series Record Remote Code Execution6
HIGHHTTP:STC:DL:XLS-SERIES7HTTP: Microsoft Excel Malformed Series Record Remote Code Execution7
HIGHHTTP:STC:DL:XLS-SERIES8HTTP: Microsoft Excel Malformed Series Record Remote Code Execution8
HIGHHTTP:STC:DL:XLS-SERIES9HTTP: Microsoft Excel Malformed Series Record Remote Code Execution9
HIGHHTTP:STC:DOTNET-BUFF-ALLOC2HTTP: .NET Framework Buffer Allocation Vulnerability2
HIGHHTTP:STC:DOTNET-BUFF-ALLOC3HTTP: .NET Framework Buffer Allocation Vulnerability3
HIGHHTTP:STC:DOTNET-BUFF-ALLOC4HTTP: .NET Framework Buffer Allocation Vulnerability4
HIGHHTTP:STC:DOTNET-BUFF-ALLOC5HTTP: .NET Framework Buffer Allocation Vulnerability5
HIGHHTTP:STC:DOTNET-BUFF-ALLOC6HTTP: .NET Framework Buffer Allocation Vulnerability6
HIGHHTTP:STC:DOTNET-BUFF-ALLOC7HTTP: .NET Framework Buffer Allocation Vulnerability7
HIGHHTTP:STC:DOTNET-BUFF-ALLOC8HTTP: .NET Framework Buffer Allocation Vulnerability8
HIGHHTTP:STC:DOTNET-BUFF-ALLOC9HTTP: .NET Framework Buffer Allocation Vulnerability9
MEDIUMHTTP:STC:DL:PPT-FF-BOF1HTTP: PowerPoint File Multiples Buffer Overflow1
HIGHHTTP:DIR:APACHE-OPENMEETINGSHTTP: Apache OpenMeetings ZIP File Path Traversal
HIGHHTTP:DIR:MANAGEENGINE-DIR-TRAHTTP: ManageEngine ServiceDesk File Upload Directory Traversal
MEDIUMHTTP:WINAMP-WLZ-BO1HTTP: Winamp wlz File Parsing Buffer Overflow1
MEDIUMHTTP:INTELLITAMPER-DEFER-BO1HTTP: IntelliTamper defer Attribute Buffer Overflow Vulnerability1
HIGHHTTP:MISC:NETCHARTS-SER-RCEHTTP: Visual Mining NetCharts Server Path Traversal File Upload Remote Code Execution
MEDIUMHTTP:ACMS-ASSETS-INFODISC1HTTP: aCMS Assets Page Information Disclosure1
MEDIUMHTTP:FOXIT-PNG-PDF-BO11HTTP: Foxit Multiple Products PNG To PDF Conversion Heap Buffer Overflow1
MEDIUMHTTP:ADOBE-INDESIGN-SOAP-RCE1HTTP: Adobe IndesignServer SOAP Server Arbitrary Script Execution1
MEDIUMHTTP:MAMBO-MYSQL-INF-DISCLOSUR1HTTP: Mambo MySQL Database Info Disclosure1
MEDIUMHTTP:MS-WINDOWS-HYPERLINK-BO1HTTP: Microsoft Windows Hyperlink Buffer Overflow1
MEDIUMHTTP:WIRELURKER-VRUPDATE1HTTP: WireLurker Version Update Detected1
MEDIUMHTTP:OFFICESCAN-CGIRECVFILE1HTTP: Trend Micro OfficeScan Server cgiRecvFile Buffer Overflow1
MEDIUMHTTP:KASPERSKY-URI-PARSING-DOS1HTTP: Kaspersky Products URI Parsing Denial of Service1
MEDIUMHTTP:REALTEK-MEDIAPLAYER-PLA-B1HTTP: Realtek Media Player pla File Parsing Buffer Overflow1
MEDIUMHTTP:IESHIMS-DLL-HIJACK1HTTP: Microsoft Internet Explorer IESHIMS.DLL Insecure Library Loading1
MEDIUMHTTP:MANAGENGINE-APP1HTTP: ManageEngine Applications Manager SQL Injection1
MEDIUMHTTP:HP-INSIGHT-DIAGNOSTICS-LF1HTTP: HP Insight Diagnostics CVE-2013-3575 Local File Inclusion1
MEDIUMHTTP:PFSENSE-ZONE-CSS1HTTP: pfSense WebGUI Zone Parameter Cross-Site Scripting1
MEDIUMHTTP:FIREFLY-MEDIA-SERVER-DOS1HTTP: Firefly Media Server Denial Of Service1
MEDIUMHTTP:NOVELL-NETIQ-MOD-POLBYPAS1HTTP: Novell NetIQ Privileged User Manager modifyAccounts Policy Bypass1
MEDIUMHTTP:MS-IE-MEMORY-CORRUPTION1HTTP: Microsoft Internet Explorer CVE-2014-2782 Use After Free1
MEDIUMHTTP:INTEGARD-PASSWORD-BOF1HTTP: Integard Web Interface Password Parameter Buffer Overflow1
MEDIUMHTTP:FORTINET-HELLO-MSG-DOS1HTTP: Fortinet Single Sign On Hello Message Denial Of Service1
MEDIUMHTTP:NGINX-RQST-URI-SECBYPASS1HTTP: Nginx Request URI Verification Security Bypass1
MEDIUMHTTP:SAP-MGT-CON-OSEXEC1HTTP: SAP Management Console SOAP Interface Code Execution1
MEDIUMHTTP:ADOBE-ROBOHELP-FILE-UPLOA1HTTP: Adobe RoboHelp Server Arbitrary File Upload and Execute1
MEDIUMHTTP:STC:DL:MS-PP-PRESENT-RCE1HTTP: Microsoft PowerPoint Presentation Handling Remote Code Execution1
MEDIUMHTTP:WIRESHARK-MPEG-BOF11HTTP: Wireshark MPEG Dissector Stack Buffer Overflow11
MEDIUMHTTP:W3C-AMAYA-BOF1HTTP: W3C Amaya Stack Based Buffer Overflow1
MEDIUMHTTP:RESIN-INFO-DISCLOSURE1HTTP: Resin Application Server Source Code Disclosure1
MEDIUMHTTP:UNUSUAL-REFERER1HTTP: Unusual Value In HTTP Referer Header1
MEDIUMHTTP:C99-SHELL-BACKDOOR1TROJAN: C99 Backdoor Actiivity1
MEDIUMHTTP:GOOGLE-SKETCHUP-BMP-BO1HTTP: Google SketchUp BMP File Buffer Overflow (CVE-2013-3664)1
MEDIUMHTTP:TRENDMICRO-CTRLMGR-SQLINJ1HTTP: Trend Micro Control Manager ad hoc query Module SQL Injection1
MEDIUMHTTP:FOXIT-FF-URL-STG-BO1HTTP: Foxit Reader Plugin for Firefox URL String Stack Buffer Overflow1
MEDIUMHTTP:SUN-GLASSFISH-AUTH-BP1HTTP: Sun Goldfish AUthentication Bypass1
MEDIUMHTTP:EMC-DPA-EJBSERVLET-RCE1HTTP: EMC Data Protection Advisor Illuminator EJBInvokerServlet Remote Code Execution1
MEDIUMHTTP:HP-SITESCOPE-INF-DISC1HTTP: HP SiteScope Log Analyzer Information Disclosure1
MEDIUMHTTP:JAVA-EXPRESS-HTML-INJ1HTTP: Sun Java System Communications Express HTML Injection1
MEDIUMHTTP:VMWARE-VSPHERE-DOS1HTTP: Vmware Vsphere Host Daemon Denial Of Service1
MEDIUMHTTP:AVIRA-SECURE-BCKUP-REG-BO1HTTP: Avira Secure Backup Registry Value Parsing Buffer Overflow1
HIGHHTTP:PROXY:SQUID-ESI-BOHTTP: Squid Proxy ESI Component Stack Buffer Overflow
HIGHAPP:CUPS:HPGL-PC-OFAPP: CUPS HPGL Filter Overflow
HIGHHTTP:STC:DL:ONENOTE-INFO-DISC2HTTP: Microsoft Office OneNote 2010 Buffer Size Validation2
HIGHHTTP:STC:IE:CVE-2015-6052-RCEHTTP: Microsoft Internet Explorer CVE-2015-6052 Remote Code Execution
CRITICALAPP:NOVELL:IMANAGER-ARB-UPLOADAPP: Novell iManager getMultiPartParameters Arbitrary File Upload
HIGHHTTP:DIR:NOVELL-GROUPWSE-DIRTRAHTTP: Novell GroupWise Admin Service FileUploadServlet Directory Traversal
MEDIUMHTTP:STC:DL:APPLE-QT-FLIC-BO1HTTP: Apple QuickTime FLIC Animation File Buffer Overflow1
HIGHHTTP:EK-ORACLE-JAVA-DWNLDHTTP: Unknown Exlpoit Downloads Oracle Java Jar file
HIGHHTTP:DIR:MANAGEENGINEHTTP: ManageEngine Multiple Products File Attachment Directory Traversal
HIGHHTTP:EK-REDKIT-OBFUS-PEHTTP: Redkit Exploit Kit Obfuscated Portable Executable
HIGHHTTP:NGINX-CHUNKED-BOHTTP: Nginx Parsed Chunked Buffer Overflow
CRITICALHTTP:MISC:HPE-IMC-RCEHTTP: HPE Intelligent Management Center WebDMServlet Insecure Deserialization
CRITICALHTTP:MISC:RED-HAT-JBOSS-CEHTTP: Red Hat JBoss Application Server doFilter Insecure Deserialization
HIGHHTTP:EK-NUCLEAR-JAR-DWNLDHTTP: Nuclear Exploit Kit Jar File Download
HIGHHTTP:EK-NUCLEAR-FLASH-FILE1HTTP: Nuclear Exploit Kit Flash File Download 1
HIGHHTTP:EK-NECLEAR-OBFU-FILEHTTP: Nuclear Exploit Kit Obfuscated File Download
HIGHHTTP:EK-MUL-PE-DOWNLOADHTTP: Multiple Exploit Kit Portable Executable Download
HIGHHTTP:ORACLE:WEBLOGIC-WLSWSAT-IDHTTP: Oracle WebLogic Server WorkContextXmlInputAdapter Insecure Deserialization
HIGHHTTP:EK-ANGLER-RELAY-TRAFFICHTTP: Angler Exploit Kit Relay Traffic Detected1
HIGHHTTP:APACHE:MOD-DAV-MERGE-DOSHTTP: Apache HTTP Server mod_dav MERGE Request Denial of Service

1 renamed signature:

SSL:CISCO-ASA-CE->SSL:CISCO-ASA-WEBVPN-CE


Details of the signatures included within this bulletin:


HTTP:STC:DL:WNDPROC-INFO-DISC1 - HTTP: Microsoft wndproc Credentials Disclosure1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft wndproc. A successful attack can result in credentials disclosure and thereafter arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DOTNET-BUFF-ALLOC1 - HTTP: .NET Framework Buffer Allocation Vulnerability1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against .NET runtime environment. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:MS-MDAC-RCE1 - HTTP: Microsoft MDAC Components Remote Code Execution1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft MDAC components. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:INFO-LEAK:MS-VISIO-XML1 - HTTP: Microsoft Visio Crafted XML File Information Disclosure1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the Microsoft Visio diagramming and vector graphics application. A successful attack can lead to unauthorized information disclosure.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:MS-OFFICE-WRITEAV-RCE1 - HTTP: Microsoft Office OneNote File Processing Remote Code Execution1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Office OneNote. A successful exploit can lead to remote code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:SAFARI:X-MAN-PAGE-RCE1 - HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Mac OS X Safari. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:INFO-LEAK:DOT-NET-CODE1 - HTTP: Microsoft .NET Framework Code Access Security Info Disclosure Vulnerability1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft .NET Framework. A successful attack can result in the attacker gaining unauthorized information about the target system without the victim's knowledge.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:PROXY:SQUID-PROXY-ESI-DOS - HTTP: Squid Proxy ESI Response Processing Denial of Service

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the Edge Side Includes (ESI) component of the Squid proxy. Successful exploitation allows the attacker to cause a denial of service condition for all clients accessing the Squid service.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • cve: CVE-2016-4555

Affected Products:

  • Squid-cache squid 3.4.3
  • Squid-cache squid 3.1.22
  • Squid-cache squid 3.2.0.5
  • Squid-cache squid 3.3.1
  • Squid-cache squid 3.2.0.15
  • Squid-cache squid 3.2.0.3
  • Squid-cache squid 4.0.6
  • Squid-cache squid 3.1.0.10
  • Squid-cache squid 3.1.12.2
  • Squid-cache squid 3.3.2
  • Canonical ubuntu_linux 12.04
  • Squid-cache squid 3.2.0.1
  • Squid-cache squid 3.1.19
  • Squid-cache squid 4.0.4
  • Squid-cache squid 3.4.14
  • Squid-cache squid 3.4.9
  • Squid-cache squid 3.1.0.15
  • Squid-cache squid 3.4.12
  • Squid-cache squid 4.0.2
  • Squid-cache squid 3.4.10
  • Squid-cache squid 3.2.0.13
  • Squid-cache squid 3.1.0.7
  • Squid-cache squid 3.3.9
  • Squid-cache squid 3.2.12
  • Squid-cache squid 3.1.0.17
  • Squid-cache squid 3.1.0.1
  • Squid-cache squid 3.1.2
  • Squid-cache squid 3.5.8
  • Squid-cache squid 3.2.0.9
  • Squid-cache squid 3.1.0.3
  • Squid-cache squid 3.1.3
  • Squid-cache squid 3.2.0.17
  • Squid-cache squid 3.2.3
  • Squid-cache squid 3.1.0.16
  • Squid-cache squid 3.2.1
  • Squid-cache squid 4.0.8
  • Squid-cache squid 3.2.7
  • Squid-cache squid 3.1.0.9
  • Canonical ubuntu_linux 14.04
  • Squid-cache squid 3.4.0.3
  • Squid-cache squid 3.2.5
  • Squid-cache squid 3.5.2
  • Squid-cache squid 3.5.11
  • Squid-cache squid 3.5.4
  • Squid-cache squid 3.2.9
  • Squid-cache squid 3.5.13
  • Squid-cache squid 3.4.4.1
  • Squid-cache squid 3.5.6
  • Squid-cache squid 3.5.15
  • Squid-cache squid 3.1.5
  • Squid-cache squid 3.5.0.2
  • Squid-cache squid 3.2.0.19
  • Squid-cache squid 3.5.17
  • Squid-cache squid 3.4.4
  • Squid-cache squid 3.5.0.4
  • Squid-cache squid 3.2.11
  • Squid-cache squid 3.3.14
  • Squid-cache squid 3.4.8
  • Squid-cache squid 3.1.16
  • Squid-cache squid 3.3.6
  • Squid-cache squid 3.3.12
  • Squid-cache squid 3.2.0.18
  • Squid-cache squid 3.2.0.6
  • Squid-cache squid 3.1.10
  • Squid-cache squid 3.1.0.12
  • Squid-cache squid 3.1.14
  • Squid-cache squid 3.3.10
  • Squid-cache squid 3.4.2
  • Squid-cache squid 3.1.21
  • Squid-cache squid 3.2.0.4
  • Squid-cache squid 3.1.12
  • Squid-cache squid 3.1.0.14
  • Squid-cache squid 3.2.0.14
  • Squid-cache squid 3.2.0.2
  • Squid-cache squid 3.2.0.11
  • Squid-cache squid 3.2.10
  • Squid-cache squid 4.0.7
  • Squid-cache squid 3.3.0
  • Squid-cache squid 3.4.0.1
  • Squid-cache squid 3.2.0.16
  • Squid-cache squid 3.4.11
  • Squid-cache squid 4.0.5
  • Squid-cache squid 3.1.0.18
  • Squid-cache squid 3.1.9
  • Squid-cache squid 3.2.0.10
  • Squid-cache squid 3.1.0.5
  • Squid-cache squid 4.0.3
  • Squid-cache squid 3.1.12.1
  • Squid-cache squid 3.1
  • Squid-cache squid 3.2.0.12
  • Squid-cache squid 4.0.1
  • Squid-cache squid 3.1.17
  • Squid-cache squid 3.0
  • Canonical ubuntu_linux 16.04
  • Canonical ubuntu_linux 15.10
  • Squid-cache squid 3.1.6
  • Squid-cache squid 3.3.8
  • Squid-cache squid 3.3.7
  • Squid-cache squid 3.1.0.8
  • Squid-cache squid 3.5.9
  • Squid-cache squid 3.2.0.8
  • Squid-cache squid 3.1.0.4
  • Squid-cache squid 3.1.4
  • Squid-cache squid 3.2.2
  • Squid-cache squid 3.1.0.2
  • Squid-cache squid 3.2.13
  • Squid-cache squid 4.0.9
  • Oracle linux 6.0
  • Squid-cache squid 3.2.6
  • Squid-cache squid 3.1.5.1
  • Squid-cache squid 3.1.7
  • Squid-cache squid 3.1.12.3
  • Squid-cache squid 3.5.1
  • Squid-cache squid 3.2.4
  • Squid-cache squid 3.1.8
  • Squid-cache squid 3.3.0.3
  • Squid-cache squid 3.5.3
  • Squid-cache squid 3.4.13
  • Squid-cache squid 3.1.0.13
  • Squid-cache squid 3.5.5
  • Squid-cache squid 3.2.8
  • Squid-cache squid 3.5.10
  • Squid-cache squid 3.1.0.6
  • Squid-cache squid 3.5.0.1
  • Squid-cache squid 3.5.7
  • Squid-cache squid 3.5.12
  • Squid-cache squid 3.4.4.2
  • Squid-cache squid 3.4.1
  • Squid-cache squid 3.5.0.3
  • Squid-cache squid 3.5.14
  • Oracle linux 7.0
  • Squid-cache squid 3.3.4
  • Squid-cache squid 3.1.18
  • Squid-cache squid 3.1.15
  • Squid-cache squid 3.5.16
  • Squid-cache squid 3.1.1
  • Squid-cache squid 3.4.0.2
  • Squid-cache squid 3.1.0.11
  • Squid-cache squid 3.3.13
  • Squid-cache squid 3.3.0.1
  • Squid-cache squid 3.1.11
  • Squid-cache squid 3.3.5
  • Squid-cache squid 3.3.11
  • Squid-cache squid 3.3.0.2
  • Squid-cache squid 3.1.20
  • Squid-cache squid 3.2.0.7
  • Squid-cache squid 3.1.13
  • Squid-cache squid 3.3.3

HTTP:STC:DL:XLS-SERIES1 - HTTP: Microsoft Excel Malformed Series Record Remote Code Execution1

Severity: HIGH

Description:

This signature detects attempts to exploit a known issue with Microsoft Excel. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:PPT-SLIDEATOM1 - HTTP: Microsoft PowerPoint SlideAtom Vulnerability1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft PowerPoint. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:NOVELL-NETIQ-MOD-POLBYPAS - HTTP: Novell NetIQ Privileged User Manager modifyAccounts Policy Bypass

Severity: HIGH

Description:

This signature detects a known policy bypass vulnerability in the Novell NetIQ Privileged User Manager. It is due to an access control weakness when handling a modifyAccounts request. A remote, unauthenticated attacker can exploit this vulnerability by sending a malicious request to a vulnerable server. Successful exploitation could result in code execution under the context of SYSTEM.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 56535
  • cve: CVE-2012-5930

Affected Products:

  • Netiq privileged_user_manager 2.3.0
  • Netiq privileged_user_manager 2.3.1

HTTP:MISC:MS-USERS-PWD-INFO-DI1 - HTTP: Microsoft FrontPage Extensions File Information Disclosure1

Severity: HIGH

Description:

This signature detects an attempt to exploit a known vulnerability against Microsoft FrontPage. A successful attack could lead to the disclosure of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:NOVELL-NETIQ-EVAL-POLBYPAS - HTTP: Novell NetIQ Privileged User Manager Eval Policy Bypass

Severity: HIGH

Description:

A policy-bypass vulnerability has been reported in Novell NetIQ Privileged User Manager, which could allow remote attackers to compromise a system. The vulnerability is due to an access control weakness when handling calls to the eval method within POST requests. A remote, unauthenticated attacker can exploit this vulnerability by sending a malicious eval request to the vulnerable server. Successful exploitation could result in command execution under the context of the SYSTEM.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 56539
  • cve: CVE-2012-5932

Affected Products:

  • Netiq privileged_user_manager 2.3.0
  • Netiq privileged_user_manager 2.3.1

HTTP:NGINX-RQST-URI-SECBYPASS3 - HTTP: Nginx Request URI Verification Security Bypass3

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Nginx. The vulnerability is caused by improper handling of unescaped space characters within URIs. A successful attack could bypass security restrictions in certain configurations.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PFSENSE-ZONE-CSS3 - HTTP: pfSense WebGUI Zone Parameter Cross-Site Scripting3

Severity: MEDIUM

Description:

A cross-site scripting vulnerability has been reported in pfSense. The vulnerability is due to services_captiveportal_zones.php not validating the zone parameter when the act parameter is set to del. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted link. Successful exploitation will result in the attacker-controlled script code being executed in the target user's browser in the context of the affected site.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:YABBSE-PKG-EXEC11 - HTTP: YabbSE Packages.php Code Execution11

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Packages.php in YabbSE. YabbSE 1.5.0 and earlier are vulnerable. Attackers can include remote malicious code in Packages.php that can allow them to execute arbitrary commands with Web server privileges.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:SQL:INJ:WP-AJAX-CATEGORY11 - HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 11

Severity: HIGH

Description:

This signature detects attempts to exploit a known SQL injection vulnerability in the WordPress Ajax Category Dropdown Plugin. It is due to insufficient validation of a parameter sent to the dhat-ajax-cat-dropdown-request.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:PHP:PHPSECUREPAGE-RFI11 - HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion11

Severity: HIGH

Description:

This signature detects attempts to exploit a known remote file inclusion vulnerability in phpSecurePages. It is due to insufficient validation of user-supplied input. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in arbitrary code execution and loss of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:ADOBE:READER-PLUGIN11 - HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption11

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader 7.0 through 7.0.8. A successful attack can result in a denial-of-service condition or possible arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:DOTNET-BUFF-ALLOC11 - HTTP: .NET Framework Buffer Allocation Vulnerability11

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against .NET runtime environment. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:CHROME:TABLE-CSS-MC3 - HTTP: Google Chrome Table Webkit Appearance CSS Property Memory Corruption3

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the Google Chrome Web Browser. A successful attack can lead to a memory corruption and arbitrary remote code execution within the context of the user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:XLS-SERIES11 - HTTP: Microsoft Excel Malformed Series Record Remote Code Execution11

Severity: HIGH

Description:

This signature detects attempts to exploit a known issue with Microsoft Excel. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:SAFARI:X-MAN-PAGE-CE11 - HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 11

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Mac OS X Safari. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:MOZILLA:FF-IMG-TAG-DO1 - HTTP: Mozilla Firefox IMG Tag Parsing Denial of Service1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Mozilla Firefox. A successful attack can result in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:TM-IWSVA-LS-CI - HTTP: Trend Micro IWSVA LogSettingHandler doPostMountDevice Command Injection

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in Trend Micro InterScan Web Security Virtual Appliance (IWSVA). Successful exploitation of this vulnerability can lead to remote command execution in the context of the root.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:MISC:HP-OPENVIEW-CE - HTTP: HP OpenView Network Node Manager Arbitrary Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the HP OpenView Network Node Manager. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • bugtraq: 45762
  • cve: CVE-2011-0263

Affected Products:

  • Hp openview_network_node_manager 7.51
  • Hp openview_network_node_manager 7.53

HTTP:STC:WIN-CCL-BOF - HTTP:Microsoft Windows Common Control Library Vulnerability

Severity: HIGH

Description:

This signature detects Web pages containing a dangerous SVG module. A malicious Web site can exploit a known vulnerability in Microsoft Windows Internet Explorer and gain control of the client browser.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 43717
  • url: http://support.avaya.com/css/P8/documents/100113195
  • url: http://www.breakingpointsystems.com/community/blog/microsoft-vulnerability-proof-of-concept/
  • url: http://blogs.technet.com/b/srd/archive/2010/10/12/note-on-bulletin-severity-for-ms10-081-and-ms10-074.aspx
  • cve: CVE-2010-2746

Affected Products:

  • Microsoft windows_7_for_32-bit_systems
  • Microsoft windows_7_for_x64-based_systems
  • Microsoft windows_vista SP1
  • Microsoft windows_server_2008_for_x64-based_systems R2
  • Microsoft windows_server_2008_for_itanium-based_systems R2
  • Microsoft windows_vista SP2
  • Microsoft windows_vista_x64_edition SP2
  • Microsoft windows_server_2008_for_32-bit_systems SP2
  • Avaya messaging_application_server
  • Microsoft windows_server_2008_for_x64-based_systems SP2
  • Avaya messaging_application_server MM 3.0
  • Avaya messaging_application_server MM 3.1
  • Microsoft windows_server_2008_for_itanium-based_systems SP2
  • Microsoft windows_server_2003_x64 SP2
  • Microsoft windows_xp_embedded SP3
  • Avaya messaging_application_server MM 1.1
  • Avaya meeting_exchange-client_registration_server
  • Avaya meeting_exchange-recording_server
  • Avaya meeting_exchange-streaming_server
  • Avaya meeting_exchange-web_conferencing_server
  • Avaya callpilot_unified_messaging
  • Microsoft windows_vista_x64_edition SP1
  • Avaya messaging_application_server 4
  • Avaya messaging_application_server 5
  • Microsoft windows_server_2003_datacenter_edition_itanium SP1 Beta 1
  • Microsoft windows_xp_tablet_pc_edition SP3
  • Microsoft windows_xp_professional_x64_edition SP3
  • Microsoft windows_xp_professional SP3
  • Microsoft windows_xp_media_center_edition SP3
  • Microsoft windows_xp_home SP3
  • Avaya messaging_application_server MM 2.0
  • Microsoft windows_server_2003 SP2
  • Avaya communication_server_1000_telephony_manager
  • Avaya aura_conferencing 6.0 Standard
  • Avaya meeting_exchange-webportal
  • Avaya aura_conferencing 6.0
  • Microsoft windows_xp_professional_x64_edition SP2
  • Microsoft windows_server_2003_itanium SP2
  • Microsoft windows_server_2008_for_32-bit_systems
  • Microsoft windows_server_2008_for_x64-based_systems
  • Microsoft windows_server_2008_for_itanium-based_systems

HTTP:PHP:HORDE-HREF-BACKDOOR1 - HTTP: Horde Href Backdoor1

Severity: HIGH

Description:

This signature detects attempts to exploit a known backdoor vulnerability in Horde. A successful attack can lead to arbitrary code execution in the context of the application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:ACTIVEX:INDUSOFT-ISSY1 - HTTP: InduSoft Web Studio ISSymbol Unsafe ActiveX Control1

Severity: HIGH

Description:

This signature detects attempts to use unsafe ActiveX controls in InduSoft Web Studio. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:YABBSE-PKG-EXEC1 - HTTP: YabbSE Packages.php Code Execution1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Packages.php in YabbSE. YabbSE 1.5.0 and earlier are vulnerable. Attackers can include remote malicious code in Packages.php that can allow them to execute arbitrary commands with Web server privileges.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:INFO:HTML5-CONTENT1 - HTTP: HTML Version 5 Content1

Severity: HIGH

Description:

This signature detects Web pages downloaded through HTTP that contain HTML5 content. HTML5 is an improved version of HTML that allows for standards-based embedded multimedia content.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:SWF-ACTIONPUSH1 - HTTP: Adobe Flash Player ActionScript ActionPush Memory Corruption 1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:ADOBE:CVE-2018-4886RCE - HTTP: Adobe Reader CVE-2018-4886 Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Reader. A successful attack can lead to Remote Code Execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • cve: CVE-2018-4886

HTTP:EXPLOIT:D-LINK-ADMIN-PW1 - HTTP: D-Link Admin Password Probe1

Severity: HIGH

Description:

This signature detects attempts to use an admin password on a D-Link network device. A successful attack can lead to an attacker controlling the router. This activity is often used by a worm called "TheMoon" to find new D-Link devices to infect - the source is most likely compromised by this worm.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:STREAM:WINAMP-META-OF - HTTP: Nullsoft Winamp Ultravox Streaming Metadata Parsing Overflow

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Nullsoft Winamp Ultravox. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the process's user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 27344
  • cve: CVE-2008-0065

Affected Products:

  • Nullsoft winamp 5.21
  • Nullsoft winamp 5.51
  • Nullsoft winamp 5.5

HTTP:INFO-LEAK:WFCHAT1 - HTTP: WFChat Information Disclosure1

Severity: HIGH

Description:

This signature detects attempts to access the files "!pwds.txt" or "!nicks.txt" on a WF-Chat server. Because access to these files is not restricted, attackers can obtain usernames and their associated passwords for the chat.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:ADOBE:CVE-2018-4890CE - HTTP: Adobe Reader CVE-2018-4890 Arbitrary Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Reader. A successful attack can lead to Arbitrary Code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2018-4890

HTTP:PHP:WP-MRKPLC-UPLOADIFY - HTTP: WP Marketplace Plugin uploadify.php Arbitrary File Upload

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against WordPress WP Marketplace Plugin. A successful attack can lead to the upload of an arbitrary file.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 53789
  • url: http://wordpress.org/extend/plugins/wpmarketplace/
  • url: http://wordpress.org/extend/plugins/email-newsletter/

Affected Products:

  • Wordpress wp_marketplace_plugin 1.5.0
  • Wordpress wp_marketplace_plugin 1.6.1

APP:NOVELL:IPRINT-ATTRIB-BO - APP: Novell iPrint Server attributes-natural-language Buffer Overflow

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in Novell iPrint Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 51791
  • cve: CVE-2011-4194

Affected Products:

  • Novell open_enterprise_server 2.0.3
  • Novell iprint

HTTP:WIRESHARK-MPEG-BOF1 - HTTP: Wireshark MPEG Dissector Stack Buffer Overflow1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in Wireshark. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:ADOBE:CVE-2018-4879-CE - HTTP: Adobe Reader CVE-2018-4879 Arbitrary Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Reader. A successful attack can lead to Arbitrary Code Execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.5.141818, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2018-4879

HTTP:PHP:WP-DOUPLOAD-FU - HTTP: WordPress Member Conversation Plugin doupload.php Arbitrary File Upload

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against WordPress Member Conversation Plugin. A successful attack can lead to the upload of an arbitrary file.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 53790
  • url: http://wordpress.org/extend/plugins/wordpress-member-private-conversation/
  • url: http://www.wordpress.org/

Affected Products:

  • Wordpress nmedia_wordpress_member_conversation 1.35.0

HTTP:STC:STREAM:QT-MPEG-PAD - HTTP: Apple QuickTime MPEG Stream Padding Buffer Overflow

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the Apple QuickTime MPEG Stream. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • bugtraq: 53467
  • cve: CVE-2012-0659

Affected Products:

  • Apple mac_os_x_server 10.7.1
  • Apple mac_os_x_server 10.7.2
  • Apple quicktime_player 7.1
  • Apple mac_os_x_server 10.6.7
  • Apple mac_os_x 10.6.6
  • Apple mac_os_x_server 10.6.6
  • Apple quicktime_player 7.7.1
  • Apple quicktime_player 7.2.1
  • Apple quicktime_player 7.2
  • Apple quicktime_player 7.3.1.70
  • Apple mac_os_x 10.6.5
  • Apple mac_os_x_server 10.6.5
  • Apple quicktime_player 7.0.1
  • Apple quicktime_player 7.0.4
  • Apple quicktime_player 7.6.6 (1671)
  • Apple quicktime_player 7.6.7
  • Apple quicktime_player 7.6
  • Apple quicktime_player 7.6.8
  • Apple quicktime_player 7.4
  • Apple quicktime_player 7.1.4
  • Apple quicktime_player 7.1.5
  • Apple quicktime_player 7.0.3
  • Apple quicktime_player 7.4.1
  • Apple quicktime_player 7.5.5
  • Apple quicktime_player 7.3
  • Apple quicktime_player 7.2.0
  • Apple quicktime_player 7.1.3
  • Apple mac_os_x 10.7
  • Apple mac_os_x_server 10.6.3
  • Apple quicktime_player 7.6.4
  • Apple quicktime_player 7.1.1
  • Apple quicktime_player 7.1.2
  • Apple mac_os_x 10.6.8
  • Apple mac_os_x_server 10.6.8
  • Apple mac_os_x 10.6.2
  • Apple mac_os_x_server 10.6.2
  • Apple quicktime_player 7.6.5
  • Apple mac_os_x 10.6.4
  • Apple quicktime_player 7.1.6
  • Apple mac_os_x 10.6.5
  • Apple mac_os_x_server 10.6.5
  • Apple mac_os_x_server 10.7
  • Apple mac_os_x_server 10.6.1
  • Apple mac_os_x 10.6.1
  • Apple quicktime_player 7.64.17.73
  • Apple mac_os_x 10.6
  • Apple mac_os_x_server 10.6
  • Apple mac_os_x 10.6.7
  • Apple mac_os_x 10.7.2
  • Apple mac_os_x_server 10.6.4
  • Apple mac_os_x 10.6.3
  • Apple quicktime_player 7.6.9
  • Apple quicktime_player 7.0.8
  • Apple quicktime_player 7.4.5
  • Apple quicktime_player 7.6.2
  • Apple mac_os_x 10.7.3
  • Apple mac_os_x_server 10.7.3
  • Apple quicktime_player 7.3.1
  • Apple quicktime_player 7.6.1
  • Apple quicktime_player 7.7
  • Apple quicktime_player 7.0.0
  • Apple quicktime_player 7.6.6
  • Apple quicktime_player 7.5
  • Apple mac_os_x 10.7.1
  • Apple quicktime_player 7.0.2

HTTP:STC:SWF:COPYRAWDATATO1 - HTTP: Adobe Flash Player copyRawDataTo Out of Bounds Array Indexing1

Severity: HIGH

Description:

A memory corruption vulnerability has been reported in Adobe Flash Player. The vulnerability is due to an out of bounds array copy in the copyRawDataTo() method of Matrix3D class. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to download and process a maliciously crafted file. This can lead to code execution in the context of the affected application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:ADOBE:CVE-2018-4902RCE - HTTP: Acrobat Reader CVE-018-4902 Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Reader. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1

References:

  • cve: CVE-2018-4902

HTTP:STC:ADOBE:CVE-2018-4895RCE - HTTP: Adobe Acrobat and Reader CVE-2018-4895 Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Reader.A successful attack can lead to Remote Code Execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.5.141818, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 102994
  • cve: CVE-2018-4895

HTTP:STC:ADOBE:CVE-2018-4884RCE - HTTP: Adobe Reader CVE-2018-4884 Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Reader. A successful attack can lead to Remote Code Execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.5.141818, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2018-4884

HTTP:INFO:FACEBOOK1 - HTTP: Facebook Access1

Severity: HIGH

Description:

This signature detects an attempt to reach the Facebook social networking Web site. Use of this service may violate your organization's acceptable use policy. This signature can be used to identify these violations.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:MS-EOT-INFO-DIS - HTTP: Microsoft Windows EOT Component Info Disclosure

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Windows EOT component. Successful exploitation could result in information disclosure

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.5.141818, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2018-0855

HTTP:STC:ADOBE:CVE-2018-4878UAF - HTTP: Adobe Flash Player CVE-2018-4878 Use After Free

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1

References:

  • cve: CVE-2018-4878
  • bugtraq: 102893
  • url: https://helpx.adobe.com/security/products/flash-player/apsb18-03.html

HTTP:STC:CHROME:TABLE-CSS-MC1 - HTTP: Google Chrome Table Webkit Appearance CSS Property Memory Corruption1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the Google Chrome Web Browser. A successful attack can lead to a memory corruption and arbitrary remote code execution within the context of the user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:WORDPRESS-LS-DOS - HTTP: WordPress load-scripts.php Denial Of Service

Severity: HIGH

Description:

This signature detects attempt to exploit denial of service vulnerability which is present in WordPress. A remote attacker could exploit this vulnerability by sending crafted requests to a vulnerable server. Successful exploitation would exhaust the resources of the target server, possibly resulting in denial-of-service conditions.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • cve: CVE-2018-6389

SSH:OPENSSH:SFTP-DOS - SSH: OpenSSH SFTP Server Denial of Service

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against OpenSSH, SFTP server. A successful attack can result in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1

References:

  • bugtraq: 101552
  • cve: CVE-2017-15906

Affected Products:

  • Openbsd openssh 5.1
  • Openbsd openssh 4.1p1
  • Openbsd openssh 3.9
  • Openbsd openssh 2.2
  • Openbsd openssh 3.0.2p1
  • Openbsd openssh 2.9p2
  • Openbsd openssh 3.3p1
  • Openbsd openssh 4.7
  • Openbsd openssh 4.3p2
  • Openbsd openssh 3.3
  • Openbsd openssh 4.0p1
  • Openbsd openssh 3.1
  • Openbsd openssh 4.8
  • Openbsd openssh 3.5p1
  • Openbsd openssh 3.7
  • Openbsd openssh 2.5
  • Openbsd openssh 4.6
  • Openbsd openssh 3.0p1
  • Openbsd openssh 3.2.3p1
  • Openbsd openssh 3.5
  • Openbsd openssh 5.9
  • Openbsd openssh 4.7p1
  • Openbsd openssh 3.9.1p1
  • Openbsd openssh 6.9
  • Openbsd openssh 5.5
  • Openbsd openssh 5.7
  • Openbsd openssh 4.4
  • Openbsd openssh 7.4
  • Openbsd openssh 2.9.9p2
  • Openbsd openssh 1.2
  • Openbsd openssh 6.3
  • Openbsd openssh 5.3
  • Openbsd openssh 3.6.1p2
  • Openbsd openssh 3.0.1
  • Openbsd openssh 6.1
  • Openbsd openssh 5.8p2
  • Openbsd openssh 1.2.27
  • Openbsd openssh 7.2
  • Openbsd openssh 2.5.1
  • Openbsd openssh 6.0
  • Openbsd openssh 3.7.1p1
  • Openbsd openssh 7.0
  • Openbsd openssh 3.2.2
  • Openbsd openssh 1.5.8
  • Openbsd openssh 2.9p1
  • Openbsd openssh 3.0.1p1
  • Openbsd openssh 3.6.1
  • Openbsd openssh 1.2.3
  • Openbsd openssh 6.7
  • Openbsd openssh 3.8.1
  • Openbsd openssh 1.2.1
  • Openbsd openssh 3.8
  • Openbsd openssh 2.3
  • Openbsd openssh 3.7.1
  • Openbsd openssh 3.4p1
  • Openbsd openssh 2.1
  • Openbsd openssh 6.6
  • Openbsd openssh 3.8.1p1
  • Openbsd openssh 2.1.1
  • Openbsd openssh 4.3p1
  • Openbsd openssh 3.2
  • Openbsd openssh 4.1
  • Openbsd openssh 2.9.9
  • Openbsd openssh 3.0
  • Openbsd openssh 4.9
  • Openbsd openssh 2.3.1
  • Openbsd openssh 3.6
  • Openbsd openssh 3.2.2p1
  • Openbsd openssh 6.5
  • Openbsd openssh 2.9
  • Openbsd openssh 4.2p1
  • Openbsd openssh 4.0
  • Openbsd openssh 3.9.1
  • Openbsd openssh 5.8
  • Openbsd openssh 6.4
  • Openbsd openssh 5.4
  • Openbsd openssh 4.3
  • Openbsd openssh 3.1p1
  • Openbsd openssh 6.8
  • Openbsd openssh 5.6
  • Openbsd openssh 4.5
  • Openbsd openssh 3.4
  • Openbsd openssh 3.0.2
  • Openbsd openssh 5.2
  • Openbsd openssh 4.2
  • Openbsd openssh 1.3
  • Openbsd openssh 6.2
  • Openbsd openssh 2.5.2
  • Openbsd openssh 3.6.1p1
  • Openbsd openssh 3.7.1p2
  • Openbsd openssh 2
  • Openbsd openssh 1.5
  • Openbsd openssh 7.5
  • Openbsd openssh 1.5.7
  • Openbsd openssh 7.3
  • Openbsd openssh 5.0
  • Openbsd openssh 4.4p1
  • Openbsd openssh 7.1
  • Openbsd openssh 1.2.2

SSL:CISCO-ASA-WEBVPN-CE - SSL: Cisco Adaptive Security Appliance Webvpn XML Parser Double Free

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Cisco Adaptive Security Appliance. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1

References:

  • bugtraq: 102845
  • cve: CVE-2018-0101

HTTP:INFO-LEAK:CA-TOTAL-DEFENSE - HTTP: CA Total Defense Suite UNCWS getDBConfigSettings Credential Information Disclosure

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known information disclosure vulnerability in CA Total Defense Suite. Its due to insufficient access control when handling requests for the web service getDBConfigSettings. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 47356
  • cve: CVE-2011-1655

Affected Products:

  • Computer_associates total_defense 12

HTTP:SQL:INJ:WP-AJAX-CATEGORY1 - HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection1

Severity: HIGH

Description:

This signature detects attempts to exploit a known SQL injection vulnerability in the WordPress Ajax Category Dropdown Plugin. It is due to insufficient validation of a parameter sent to the dhat-ajax-cat-dropdown-request.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:IMG:OFFICE-FLASHPIX1 - HTTP: Microsoft Office Malicious FlashPix Graphics File1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against the Microsoft Office FlashPix Graphics Filter. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


APP:LANDESK-THINKMGT-DIRTRVRSAL - APP: LANDesk ThinkManagement Suite SetTaskLogByFile Directory Traversal

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against LANDesk ThinkManagement Suite. Attackers can traverse arbitrary directories on the server resulting in the attacker accessing areas of the system otherwise unintended to be accessed externally.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 52023
  • cve: CVE-2012-1196

Affected Products:

  • Landesk_software lenovo_thinkmanagement_console 9.0.3

HTTP:STC:DL:QUICKTIME-QTVR-BOF1 - HTTP: Apple QuickTime QTVR QTVRStringAtom Parsing Buffer Overflow (CVE-2012-0667)1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Apple QuickTime. It is due to a signedness error, which leads to a stack-based buffer overflow when processing a QTVR string atom having an overly large stringLength parameter. A remote attacker can exploit this vulnerability by enticing a user to download and process a specially crafted QuickTime VR file with the vulnerable software. This can lead to code execution in the context of the vulnerable application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:IIS:WEBDAV:XML-HANDLER-DOS - HTTP: Microsoft WebDAV XML Message Handler Denial of Service

Severity: MEDIUM

Description:

This signature detects denial-of-service (DoS) attempts against the WebDAV XML Message Handler in Microsoft IIS. Attackers can send a malicious HTTP request to a WebDAV enabled IIS server to cause it to consume all system resources. A machine reboot is required to resume service.

Supported On:

isg-3.5.141652, idp-5.1.110161014, DI-Server, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, DI-Base, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 11384
  • cve: CVE-2003-0718

Affected Products:

  • Microsoft windows_xp_professional
  • Microsoft windows_xp_home
  • Microsoft windows_2000_server
  • Microsoft windows_2000_datacenter_server
  • Microsoft windows_2000_professional SP3
  • Microsoft windows_2000_server SP3
  • Microsoft windows_2000_advanced_server SP3
  • Microsoft windows_xp_64-bit_edition
  • Microsoft windows_2000_datacenter_server SP3
  • Microsoft windows_xp_64-bit_edition SP1
  • Avaya definityone_media_servers R10
  • Microsoft windows_2000_datacenter_server SP1
  • Avaya ip600_media_servers R10
  • Avaya s3400_message_application_server
  • Avaya s8100_media_servers
  • Avaya s8100_media_servers R11
  • Avaya definityone_media_servers R11
  • Avaya ip600_media_servers R11
  • Microsoft windows_2000_professional
  • Microsoft windows_2000_advanced_server
  • Microsoft windows_2000_advanced_server SP1
  • Microsoft windows_2000_advanced_server SP4
  • Microsoft windows_2000_datacenter_server SP4
  • Microsoft windows_2000_professional SP4
  • Microsoft windows_2000_server SP4
  • Microsoft iis 5.0
  • Microsoft windows_xp_64-bit_edition_version_2003
  • Microsoft windows_2000_server SP1
  • Microsoft windows_server_2003_standard_edition
  • Microsoft iis 5.1
  • Microsoft windows_2000_professional SP1
  • Microsoft windows_xp_64-bit_edition_version_2003 SP1
  • Microsoft windows_xp_home SP1
  • Microsoft windows_xp_professional SP1
  • Microsoft windows_server_2003_enterprise_edition_itanium
  • Microsoft windows_2000_server SP2
  • Avaya modular_messaging_(mss) 1.1.0
  • Microsoft windows_2000_advanced_server SP2
  • Microsoft windows_2000_datacenter_server SP2
  • Microsoft windows_2000_professional SP2
  • Avaya modular_messaging_(mss) 2.0.0
  • Avaya s8100_media_servers R10
  • Microsoft windows_server_2003_enterprise_edition
  • Microsoft windows_server_2003_datacenter_edition
  • Microsoft windows_server_2003_web_edition
  • Avaya definityone_media_servers
  • Microsoft windows_server_2003_datacenter_edition_itanium
  • Avaya ip600_media_servers
  • Microsoft iis 6.0

HTTP:DIR:MANAGEENGINE - HTTP: ManageEngine Multiple Products File Attachment Directory Traversal

Severity: HIGH

Description:

This signature detects directory traversal attack attempts on ManageEngine ServiceDesk Plus, AssetExplorer, SupportCenter and IT360. A successful attack scenario, the attacker can execute arbitrary code with SYSTEM privileges by placing executable files in critical locations.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2014-5301

HTTP:STC:OLE-SHELL1 - HTTP: Malicious OLE Object in Office Document1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Windows Shell. Attackers can use this vulnerability to exploit a system if a user is logged on with administrative privileges. The attacker could take complete control of the affected system. However, user interaction is required to exploit this vulnerability.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:LEXMARK-LIB-FILE-DIR-TRAV - HTTP: Lexmark Markvision LibraryFileUploadServlet Directory Traversal

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Lexmark Markvision Enterprise . A successful attack can result in directory traversal attacks.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2014-9375

HTTP:PHP:VS-NEWS-RFI1 - HTTP: VirtualSystem VS-News-System Show_News_Inc.PHP Remote File Inclusion1

Severity: HIGH

Description:

This signature detects attempts to exploit a known remote file inclusion vulnerability in the VirtualSystem VS-News-System. It is due to insufficient validation of user-supplied input in Show_News_Inc.php. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in arbitrary code execution and loss of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:IE:SETCAPTURE-UAF1 - HTTP: Microsoft Internet Explorer SetCapture Use After Free1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


APP:HP-PROCURVE-FILE-UPLOAD - APP: HP ProCurve Manager SNAC UpdateCertificatesServlet Code Execution (HTTP)

Severity: CRITICAL

Description:

This signature detects attempts to exploit a known vulnerability against HP ProCurve Manager. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2013-4812

Affected Products:

  • Hp procurve_manager 3.20 (:~~~plus~~)
  • Hp procurve_manager 4.0 (:~~~plus~~)
  • Hp identity_driven_manager 4.0

HTTP:STC:IE:MDAO-RCE1 - HTTP: Microsoft Data Access Object Memory Corruption Remote Code Execution1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Data Access Object. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:HEX-WORKSHP-CMAP-C1 - HTTP: BreakPoint Software Hex Workshop ".CMAP" File Arbitrary Code Execution1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in BreakPoint Software Hex Workshop. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:OPEN-TYPE-RCE11 - HTTP: Open Type Font Parsing Remote Code Execution1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in Open Type Font. A successful attack can lead to a arbitrary remote code execution within the context of the current user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:ADOBE:CVE-2015-3122-C1 - HTTP: Adobe Flash CVE-2015-3122 Remote Code Execution1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:SCRIPT:GARBLE-JS-OBFU1 - HTTP: Garble Javascript Obfuscation Detected1

Severity: HIGH

Description:

This signature detects attempts to use Garble Javascript obfuscation. Recent exploits leverage such obfuscation utilities to sneak under the network perimeter security appliances.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:CHROME:JS-MSGBOX-DOS1 - HTTP: Google Chrome Java Script Message Box Denial of Service1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Google Chrome. A successful attack can result in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:ADOBE:CVE-2015-5133-C1 - HTTP: Adobe Flash CVE-2015-5133 Remote Code Execution1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:IE:CVE-2014-4134-MC1 - HTTP: Microsoft Internet Explorer CVE-2014-4134 Memory Corruption1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:IE:CVE-2014-4086-UAF1 - HTTP: Microsoft Internet Explorer Use After Free (CVE-2014-4086)1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:IE:CVE-2014-0267-MC1 - HTTP: Microsoft Internet Explorer CVE-2014-0267 Memory Corruption1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:IE:MHTML-HREF-OF1 - HTTP: MHTML HREF Overflow1

Severity: HIGH

Description:

This signature detects excessively long MHTML HREF links in HTML documents. Malicious Web sites can use invalid hyperlinks to crash client browsers.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:IE:CVE-2014-4126-MC1 - HTTP: Microsoft Internet Explorer CVE-2014-4126 Memory Corruption1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:IE:HTML-HELP-ZONE-BP1 - HTTP: Internet Explorer HTML Help Zone Bypass1

Severity: HIGH

Description:

This signature detects attempts to invoke the HTML Help ActiveX control in a web page with the location of the help file set to a local file. If attackers have previously placed a help file on the local drive, they can use this exploit to execute code with user privileges on a target host running Microsoft Internet Explorer.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:IE:OBJECT-TAG-XML1 - HTTP: Microsoft Internet Explorer Object Tag XML RCE1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:IE:ONBEFORECOPY-UAF1 - HTTP: Microsoft Internet Explorer onBeforeCopy Use After Free1

Severity: HIGH

Description:

This signature detects attempts to exploit a known issue in Microsoft Internet Explorer. Successful attempts could allow a remote attacker to execute arbitrary code on the targeted system.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:IE:CVE-2014-4140-CE1 - HTTP: Microsoft Internet Explorer CVE-2014-4140 Arbitrary Code Execution1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:ADOBE-ROBOHELP-FILE-UPLOA2 - HTTP: Adobe RoboHelp Server Arbitrary File Upload and Execute2

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Adobe RoboHelp. It is due to insufficient validation of POST requests sent to the management web server. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:YABBSE-PKG-EXEC10 - HTTP: YabbSE Packages.php Code Execution10

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Packages.php in YabbSE. YabbSE 1.5.0 and earlier are vulnerable. Attackers can include remote malicious code in Packages.php that can allow them to execute arbitrary commands with Web server privileges.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:STREAM:VLC-REALINDEX1 - HTTP: VideoLAN VLC real.c ReadRealIndex Real Demuxer Integer Overflow1

Severity: MEDIUM

Description:

This signature detects a known flaw against VideoLAN VLC Media Player. It is caused due to an integer overflow when playing a specially crafted RealMedia (.rm) file. An unauthenticated remote attacker could exploit this vulnerability by enticing a user to play a specially crafted RealMedia file. Successful exploitation would cause a heap buffer overflow allowing the attacker to execute arbitrary code with the privileges of the currently logged on user. In an attack case where code injection is not successful, VideoLAN VLC client application will terminate unexpectedly. In a more sophisticated attack scenario where code injection is successful, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user. The affected application would also most likely stop functioning as a result of such an attack.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:STREAM:QT-MOV-FILE-BO1 - HTTP: Apple QuickTime Movie File Clipping Region Handling Heap Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Apple QuickTime. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:STREAM:FLASH-MEMORY1 - HTTP: Macromedia Flash Player Improper Memory Access1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Macromedia Flash Player. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:STREAM:DIRECTSHOW-MJP1 - HTTP: Microsoft Windows MJPEG Media Decompression Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in the Microsoft Windows DirectShow component. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:ADOBE-ROBOHELP-FILE-UPLOA3 - HTTP: Adobe RoboHelp Server Arbitrary File Upload and Execute3

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Adobe RoboHelp. It is due to insufficient validation of POST requests sent to the management web server. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


APP:HP-PROCRVE-SNAC-FILE-UPLD - APP: HP ProCurve Manager SNAC UpdateDomainControllerServlet Code Execution

Severity: CRITICAL

Description:

This signature detects attempts to exploit a known vulnerability against HP ProCurve Manager. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2013-4811
  • bugtraq: 62349

Affected Products:

  • Hp procurve_manager 3.20 (:~~~plus~~)
  • Hp procurve_manager 4.0 (:~~~plus~~)
  • Hp identity_driven_manager 4.0

HTTP:STC:MOZILLA:OGG-VORBIS1 - HTTP: Multiple Mozilla Products Ogg Vorbis Decoding Memory Corruption1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Mozilla Firefox, Thunderbird and Seamonkey. A successful attack can lead to memory corruption and arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:MOZILLA:NNTP-URL1 - HTTP: Mozilla NNTP URL Handling Buffer Overflow1

Severity: MEDIUM

Description:

A vulnerability has been reported in the way the Mozilla browser handles NNTP URLs. Due to insufficient input validation, a specially crafted URI using the scheme news:// can overflow a heap buffer. By enticing a user to follow a specially crafted NNTP URI, an attacker can remotely exploit this vulnerability in a way that allows for code injection and execution with the privileges of the currently logged in user. In a simple exploit attempt, an instance of a vulnerable Mozilla browser will open a connection with the server listening at the address and the port provided in the specially crafted news:// URI. When the vulnerable function is called to process the commands embedded in the URI, the application will terminate with a memory access violation error. In a more sophisticated attack case, the process flow can be diverted allowing for arbitrary code execution. In such a case, the behaviour of the target is dependent on the nature of the injected code.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:INFO-LEAK:WFCHAT11 - HTTP: WFChat Information Disclosure11

Severity: HIGH

Description:

This signature detects attempts to access the files "!pwds.txt" or "!nicks.txt" on a WF-Chat server. Because access to these files is not restricted, attackers can obtain usernames and their associated passwords for the chat.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:JAVA:GIF-MEMCORRUPT1 - HTTP: Sun Java GIF File Handling Memory Corruption1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Sun Java SDK and Java Runtime Environment. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:DOS:DRUPAL-XML-RPC-IEE - HTTP: Drupal Core XML-RPC Endpoint Internal Entity Expansion Denial of Service

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Drupal Core XML-RPC. The vulnerability is due to an input validation error when an XML-RPC endpoint handles Internal Entity Expansion. This can cause a very high CPU load and memory exhaustion. A successful attack can result in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2014-5265

Affected Products:

  • Drupal drupal 7.28
  • Wordpress wordpress 3.9.0
  • Wordpress wordpress 3.0.2
  • Drupal drupal 7.9
  • Wordpress wordpress 3.0.4
  • Drupal drupal 7.22
  • Wordpress wordpress 3.0.6
  • Wordpress wordpress 3.3.3
  • Drupal drupal 7.13
  • Wordpress wordpress 3.4.1
  • Drupal drupal 7.20
  • Wordpress wordpress 3.8
  • Wordpress wordpress 3.3.1
  • Drupal drupal 7.11
  • Drupal drupal 7.26
  • Drupal drupal 6.21
  • Drupal drupal 7.17
  • Drupal drupal 7.24
  • Drupal drupal 7.15
  • Wordpress wordpress 3.5.1
  • Wordpress wordpress 3.0
  • Wordpress wordpress 3.8.1
  • Drupal drupal 6.22
  • Drupal drupal 7.19
  • Wordpress wordpress 3.1.4
  • Wordpress wordpress 3.2
  • Drupal drupal 6.24
  • Drupal drupal 7.5
  • Drupal drupal 6.26
  • Drupal drupal 6.19
  • Wordpress wordpress 3.6
  • Drupal drupal 6.28
  • Wordpress wordpress 3.1.2
  • Drupal drupal 6.15
  • Wordpress wordpress 3.6.1
  • Drupal drupal 6.1
  • Drupal drupal 6.32
  • Drupal drupal 6.17
  • Drupal drupal 7.4
  • Drupal drupal 6.30
  • Drupal drupal 6.11
  • Drupal drupal 7.30
  • Drupal drupal 6.3
  • Drupal drupal 6.13
  • Drupal drupal 7.7
  • Drupal drupal 7.0
  • Wordpress wordpress 3.7.1
  • Drupal drupal 6.7
  • Wordpress wordpress 3.0.1
  • Drupal drupal 6.9
  • Drupal drupal 7.29
  • Wordpress wordpress 3.0.3
  • Drupal drupal 7.6
  • Wordpress wordpress 3.9.1
  • Wordpress wordpress 3.0.5
  • Drupal drupal 7.8
  • Wordpress wordpress 3.3.2
  • Drupal drupal 7.23
  • Drupal drupal 7.1
  • Drupal drupal 7.12
  • Wordpress wordpress 3.4.0
  • Drupal drupal 7.21
  • Drupal drupal 7.10
  • Wordpress wordpress 3.4.2
  • Drupal drupal 7.27
  • Drupal drupal 7.16
  • Drupal drupal 7.25
  • Drupal drupal 6.5
  • Wordpress wordpress 3.5.0
  • Drupal drupal 7.14
  • Drupal drupal 6.20
  • Wordpress wordpress 3.1
  • Drupal drupal 6.23
  • Wordpress wordpress 3.3
  • Drupal drupal 6.25
  • Drupal drupal 7.18
  • Drupal drupal 7.3
  • Drupal drupal 6.27
  • Drupal drupal 6.18
  • Wordpress wordpress 3.7
  • Wordpress wordpress 3.2.1
  • Drupal drupal 6.29
  • Wordpress wordpress 3.1.1
  • Drupal drupal 6.14
  • Wordpress wordpress 3.1.3
  • Drupal drupal 7.2
  • Drupal drupal 6.16
  • Drupal drupal 6.0
  • Drupal drupal 6.10
  • Drupal drupal 7.x-dev
  • Drupal drupal 6.2
  • Drupal drupal 6.31
  • Drupal drupal 6.12
  • Drupal drupal 6.4
  • Drupal drupal 6.6
  • Drupal drupal 6.8

HTTP:STC:IMG:OFFICE-FLASHPIX21 - HTTP: Microsoft Office Malicious FlashPix Image (2)1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against the Microsoft Office FlashPix Graphics filter. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:INFO-LEAK:WFCHAT10 - HTTP: WFChat Information Disclosure10

Severity: HIGH

Description:

This signature detects attempts to access the files "!pwds.txt" or "!nicks.txt" on a WF-Chat server. Because access to these files is not restricted, attackers can obtain usernames and their associated passwords for the chat.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:IMG:KODAK-TIFF1 - HTTP: Microsoft Windows Kodak Image Viewer Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Windows Kodak Image Viewer. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:IMG:ICO-SIZE-OF1 - HTTP: Overlarge ICO Size Parameter1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:IE:XML-HANDLE-EXEC1 - HTTP: Internet Explorer XML Handling Exploit Attempt1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Internet Explorer's XML handling. An attacker can create a malicious Web site containing Web pages with dangerous XML data, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:ACTIVEX:ICONICS-WEBHM1 - HTTP: ICONICS IcoSetServer Unsafe ActiveX Control1

Severity: HIGH

Description:

This signature detects attempts to use unsafe ActiveX controls used by ICONICS WebHMI. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:IE:URL-FILE-BOF1 - HTTP: Microsoft Windows Explorer Invalid URL File1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in the handling of url files in Microsoft Windows. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:IE:SAMEID-RCE1 - HTTP: Microsoft Internet Explorer Same ID Property Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Internet Explorer. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:IE:PRINT-PREVIEW-CE1 - HTTP: Microsoft Internet Explorer Print Preview Handling Command Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Microsoft Internet Explorer. It is due to improper security enforcement in the implementation of Print Preview. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:WORD-REC-LEN-OF1 - HTTP: Microsoft Word Record Parsing Length Field Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Office Word documents. Attackers can execute arbitrary code within the context of the user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:SAFARI:X-MAN-PAGE-CE10 - HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 10

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Mac OS X Safari. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:PHPSECUREPAGE-RFI10 - HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion10

Severity: HIGH

Description:

This signature detects attempts to exploit a known remote file inclusion vulnerability in phpSecurePages. It is due to insufficient validation of user-supplied input. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in arbitrary code execution and loss of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:XLS-SERIES10 - HTTP: Microsoft Excel Malformed Series Record Remote Code Execution10

Severity: HIGH

Description:

This signature detects attempts to exploit a known issue with Microsoft Excel. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:ADOBE:READER-PLUGIN10 - HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption10

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader 7.0 through 7.0.8. A successful attack can result in a denial-of-service condition or possible arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:SQL:INJ:WP-AJAX-CATEGORY10 - HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 10

Severity: HIGH

Description:

This signature detects attempts to exploit a known SQL injection vulnerability in the WordPress Ajax Category Dropdown Plugin. It is due to insufficient validation of a parameter sent to the dhat-ajax-cat-dropdown-request.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:DL:VISIO-VSD-MEM1 - HTTP: Microsoft Visio VSD File Format Memory Corruption Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Visio. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:VISIO-OBJ-CONFUSIO1 - HTTP: Microsoft Visio Object Type Confusion Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Visio. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:SOPHOS-ZIPDOS1 - HTTP: Sophos Anti-Virus Zip File Handling Denial of Service1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Sophos Anti-Virus. A successful attack can result in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:SANDWORM-RCE1 - HTTP: Microsoft Office SandWorm Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects an attempt to exploit a known vulnerability against Microsoft Office PowerPoint presentation show based files. Successful exploitation could allow an attacker to execute arbitrary commands into the context of the running application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DOTNET-BUFF-ALLOC10 - HTTP: .NET Framework Buffer Allocation Vulnerability10

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against .NET runtime environment. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:CHROME:TABLE-CSS-MC2 - HTTP: Google Chrome Table Webkit Appearance CSS Property Memory Corruption2

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the Google Chrome Web Browser. A successful attack can lead to a memory corruption and arbitrary remote code execution within the context of the user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


APP:NOVELL:IMANAGER-FILE-UPLOAD - APP: Novell iManager getMultiPartParameters Unauthorized File Upload

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Novell iManager. A successful attack can lead to the upload of an arbitrary file.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 43635

Affected Products:

  • Novell imanager 2.5.0
  • Novell imanager 2.0.2
  • Novell imanager 2.7.3
  • Novell imanager 2.7.0
  • Novell imanager 2.7.1
  • Novell imanager 2.7.3.2
  • Novell imanager 2.7.3 FTF2
  • Novell imanager 2.0.0
  • Novell imanager 2.6.0

HTTP:STC:DL:QT-STSC-ATOM-MC1 - HTTP: Microsoft DirectShow QuickTime stsc Atom Parsing Memory Corruption1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Microsoft DirectShow QuickTime Movie Parser filter. It is due to improper input validation when parsing crafted stsc atoms in QuickTime format files. A successful attack can lead to memory corruption and arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:QT-PDAT1 - HTTP: Apple QuickTime PDAT Atom Parsing Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in the Apple Quicktime. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:WIN-SHELLHNDL1 - HTTP: Microsoft Windows Shell Handler URL Validation1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Windows Shell Handler. Attackers can trick victims into visiting hostile Web pages, which if successful, can result in remote code execution on the victim's system.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:QT-JVTCOMPENCODE1 - HTTP: Apple QuickTime MOV File JVTCompEncodeFrame Heap Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Apple Quicktime. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:QT-CRGN-ATOM1 - HTTP: Apple QuickTime crgn Atom Parsing Memory Corruption1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Apple QuickTime Player. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:QT-COLOR-ATOM1 - HTTP: Apple QuickTime Color Table Atom Movie File Handling Heap Corruption1

Severity: MEDIUM

Description:

There exists a memory corruption vulnerability in Apple QuickTime. The flaw is due to boundary errors when processing QuickTime Movie files. A remote attacker can exploit this vulnerability by enticing the target user to open a crafted QuickTime Movie file. Successful exploitation may lead to arbitrary code execution in the security context of the logged in user. In an attack case where code injection is successful, the behaviour of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user. In an attack case where code injection is not successful, if the affected Apple QuickTime process will terminate abnormally.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


APP:MCAFEE-WR-JBOSS-RCE - APP: McAfee Web Reporter JBoss EJBInvokerServlet Marshalled Object Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against McAfee Web Reporter. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:PPT-TEXTBYTESATM-B1 - HTTP: Microsoft PowerPoint Viewer TextBytesAtom Stack Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Microsoft PowerPoint Viewer. An attacker can create a malicious Web site containing Web pages with dangerous Powerpoint files, which if accessed by a victim, allows the attacker to upload and download files from the victim's computer, potentially resulting in arbitrary program execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:PPT-PP7-MC1 - HTTP: Microsoft Office PowerPoint PP7 File Handling Memory Corruption1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Office PowerPoint. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:PPT-OFFICEART1 - HTTP: Microsoft Powerpoint OfficeArtClient Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Powerpoint. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:DOS:DRUPAL-XMLRPC-TAGS - HTTP: Drupal Core XML-RPC Endpoint Tags Denial of Service

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Drupal Core XMLRPC Endpoint. A successful attack can result in a denial-of-service condition. The vulnerability is due to an input validation error when XML-RPC endpoint handles an unreasonably large number of tags, which can cause a very high CPU load and memory exhaustion.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2014-5266

Affected Products:

  • Drupal drupal 7.28
  • Wordpress wordpress 3.9.0
  • Wordpress wordpress 3.0.2
  • Drupal drupal 7.9
  • Wordpress wordpress 3.0.4
  • Drupal drupal 7.22
  • Wordpress wordpress 3.0.6
  • Wordpress wordpress 3.3.3
  • Drupal drupal 7.13
  • Wordpress wordpress 3.4.1
  • Drupal drupal 7.20
  • Wordpress wordpress 3.8
  • Wordpress wordpress 3.3.1
  • Drupal drupal 7.11
  • Drupal drupal 7.26
  • Drupal drupal 6.21
  • Drupal drupal 7.17
  • Drupal drupal 7.24
  • Drupal drupal 7.15
  • Wordpress wordpress 3.5.1
  • Wordpress wordpress 3.0
  • Wordpress wordpress 3.8.1
  • Drupal drupal 6.22
  • Drupal drupal 7.19
  • Wordpress wordpress 3.1.4
  • Wordpress wordpress 3.2
  • Drupal drupal 6.24
  • Drupal drupal 7.5
  • Drupal drupal 6.26
  • Drupal drupal 6.19
  • Wordpress wordpress 3.6
  • Drupal drupal 6.28
  • Wordpress wordpress 3.1.2
  • Drupal drupal 6.15
  • Wordpress wordpress 3.6.1
  • Drupal drupal 6.1
  • Drupal drupal 6.32
  • Drupal drupal 6.17
  • Drupal drupal 7.4
  • Drupal drupal 6.30
  • Drupal drupal 6.11
  • Drupal drupal 7.30
  • Drupal drupal 6.3
  • Drupal drupal 6.13
  • Drupal drupal 7.7
  • Drupal drupal 7.0
  • Wordpress wordpress 3.7.1
  • Drupal drupal 6.7
  • Wordpress wordpress 3.0.1
  • Drupal drupal 6.9
  • Drupal drupal 7.29
  • Wordpress wordpress 3.0.3
  • Drupal drupal 7.6
  • Wordpress wordpress 3.9.1
  • Wordpress wordpress 3.0.5
  • Drupal drupal 7.8
  • Wordpress wordpress 3.3.2
  • Drupal drupal 7.23
  • Drupal drupal 7.1
  • Drupal drupal 7.12
  • Wordpress wordpress 3.4.0
  • Drupal drupal 7.21
  • Drupal drupal 7.10
  • Wordpress wordpress 3.4.2
  • Drupal drupal 7.27
  • Drupal drupal 7.16
  • Drupal drupal 7.25
  • Drupal drupal 6.5
  • Wordpress wordpress 3.5.0
  • Drupal drupal 7.14
  • Drupal drupal 6.20
  • Wordpress wordpress 3.1
  • Drupal drupal 6.23
  • Wordpress wordpress 3.3
  • Drupal drupal 6.25
  • Drupal drupal 7.18
  • Drupal drupal 7.3
  • Drupal drupal 6.27
  • Drupal drupal 6.18
  • Wordpress wordpress 3.7
  • Wordpress wordpress 3.2.1
  • Drupal drupal 6.29
  • Wordpress wordpress 3.1.1
  • Drupal drupal 6.14
  • Wordpress wordpress 3.1.3
  • Drupal drupal 7.2
  • Drupal drupal 6.16
  • Drupal drupal 6.0
  • Drupal drupal 6.10
  • Drupal drupal 7.x-dev
  • Drupal drupal 6.2
  • Drupal drupal 6.31
  • Drupal drupal 6.12
  • Drupal drupal 6.4
  • Drupal drupal 6.6
  • Drupal drupal 6.8

HTTP:STC:DL:OTF-DOS1 - HTTP: Microsoft Windows OpenType Font (OTF) Denial of Service1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Windows OpenType Font (OTF). A denial-of-service condition can be created when a client downloads a specially crafted OpenType Font (.otf) file.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:OFFICE-PICT-MC1 - HTTP: Microsoft Office PICT Filter Invalid Length Memory Corruption1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known flaw in Microsoft Office PICT Filter. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:OFF-GDI-HOF1 - HTTP: Microsoft Office GDI+ Heap Overflow Vulnerability 1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in the Microsoft Office GDI parser. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:NETOP-DWS-BOF1 - HTTP: Netop Remote Control dws File Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Netop Remote Control. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:MS-PUB-RCE1 - HTTP: Microsoft Publisher Pubconv.dll Function Pointer Overwrite1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Office. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


APP:ORACLE:VIRTUAL-AGENT-CMDINJ - APP: Oracle Virtual Server Agent Command Injection

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in Oracle VM. The vulnerability is due to an input validation error in proxy parameters of utl_test_url function in Oracle VM Agent when processing XML-RPC requests. A remote authenticated attacker can exploit this vulnerabilities to inject and execute arbitrary commands.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2010-3582
  • bugtraq: 44031
  • bugtraq: 44047
  • cve: CVE-2010-3585

Affected Products:

  • Oracle oracle_vm 2.2.1

HTTP:STC:JAVA:PRVDR-SKLTON-SB1 - HTTP: Oracle Java ProviderSkeleton Sandbox Bypass1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Oracle Java. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:MS-OBJ-PACKAGER-RC1 - HTTP: Microsoft Windows Object Packager ClickOnce Object Handling Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Windows Object Packager. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:MSHTML-HELP1 - HTTP: Microsoft HTML Help '.chm' File Stack Buffer Overflow Vulnerability1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Microsoft HTML Help. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the client.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:MSDOTNET-FUNC-PTR1 - HTTP: Microsoft .NET Framework Improper Execution of Function Pointer1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft's .NET Framework. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:MS-DOC-STREAM-CE1 - HTTP: Microsoft Word Document Stream Handling Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Office Word. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:MAL-MEDIA-RCE1 - HTTP: Malformed Media Files Processing Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Malformed Media File. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:LIBXML2-ENTRY-NAME1 - HTTP: libxml2 XML File Processing Long Entity Name Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in libxml2 XML library. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:FAX-EDITOR-RCE1 - HTTP: Fax Cover Page Editor Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Fax Cover Page Editor. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:EMF-EMR-INT1 - HTTP: OpenOffice EMF File EMR Record Parsing Integer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in the OpenOffice EMF File EMR Record. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:EICAR1 - HTTP: EICAR Antivirus Test File Download1

Severity: MEDIUM

Description:

This signature detects the EICAR antivirus test file downloaded through HTTP.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:DS-ATOM-TABLE1 - HTTP: Microsoft DirectShow Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft DirectShow. A successful attack can allow attackers to execute remote code in the context of the current logged in user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:CAB-VULNS1 - HTTP: Cab File Multiple Vulnerabilities1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against multiple CAB file parsing programs. Attackers can send files or links to files containing hostile CAB files resulting in full control of the victim's computer.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:APPLE-QT-RNET-OF - HTTP: Apple QuickTime rnet Box Parsing Heap Buffer Overflow

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in Apple QuickTime. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 56438
  • cve: CVE-2012-3756

Affected Products:

  • Apple quicktime 6.5.0
  • Apple quicktime 7.1.6
  • Apple quicktime 6.3.0
  • Apple quicktime 7.6.9
  • Apple quicktime 4.1.2
  • Apple quicktime 6.4.0
  • Apple quicktime 7.4.0
  • Apple quicktime 6.2.0
  • Apple quicktime 7.1.1
  • Apple quicktime 7.1.2
  • Apple quicktime 7.1.3
  • Apple quicktime 7.0.0
  • Apple quicktime 6.5.1
  • Apple quicktime 7.3.0
  • Apple quicktime 7.3.1.70
  • Apple quicktime 5.0.2
  • Apple quicktime 7.6.8
  • Apple quicktime 7.0.3
  • Apple quicktime 7.6.7
  • Apple quicktime 7.3.1
  • Apple quicktime 7.0.2
  • Apple quicktime 6.0.0
  • Apple quicktime 7.6.6
  • Apple quicktime 7.7.0
  • Apple quicktime 7.4.5
  • Apple quicktime 7.0.4
  • Apple quicktime 7.2.0
  • Apple quicktime 7.5.0
  • Apple quicktime 5.0.1
  • Apple quicktime 7.1.0
  • Apple quicktime 6.0.2
  • Apple quicktime 6.1
  • Apple quicktime 7.7.1
  • Apple quicktime 7.6.2
  • Apple quicktime 7.6.5
  • Apple quicktime 6.5
  • Apple quicktime 7.6.1
  • Apple quicktime 6.1.1
  • Apple quicktime 7.4.1
  • Apple quicktime 6.0.1
  • Apple quicktime 7.2.1
  • Apple quicktime 7.6.0
  • Apple quicktime 7.5.5
  • Apple quicktime 3.0
  • Apple quicktime 7.1.4
  • Apple quicktime 6.0
  • Apple quicktime 7.1.5
  • Apple quicktime up to 7.7.2
  • Apple quicktime 6.5.2
  • Apple quicktime 7.0.1
  • Apple quicktime 5.0

HTTP:STC:DL:ARJ-BO1 - HTTP: NOD32 AntiVirus ARJ Archive Handling Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in the NOD32 AntiVirus. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the service.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:APPLE-QT-MOV-DOS1 - HTTP: Apple QuickTime Player MOV File Handling Denial of Service1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Apple QuickTime Player. A successful attack can result in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:APPLE-QT-IMAGE-MC1 - HTTP: Apple QuickTime Image Description Atom Sign Extension Memory Corruption1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Apple QuickTime. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the current user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:APPLE-QT-H264-BOF1 - HTTP: Apple QuickTime H.264 Crafted Movie Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in the MP4/MP4V/M4V file format. A successful attack can lead arbitrary remote code execution within the context of the user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:NOVELL:ZENWORKS-RTRLET-COM - HTTP: Novell ZENWorks Asset Management 'rtrlet' Component Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Novell ZENWorks Asset Management 'rtrlet' Component. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • bugtraq: 50966
  • url: http://download.novell.com/Download?buildid=hPvHtXeNmCU~
  • url: http://www.novell.com/products/zenworks/assetmanagement/overview.html
  • cve: CVE-2011-2653

Affected Products:

  • Novell zenworks_asset_management 7.5

HTTP:STC:DL:ACE-BO1 - HTTP: Avast! Antivirus ACE File Handling Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in the Avast! Antivirus. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the service.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:GIMP-XWD-BO1 - HTTP: GIMP XWD File Handling Stack Buffer Overflow1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the GNU Image Manipulation Program (GIMP). A successful attack can lead to a buffer overflow and arbitrary remote code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:GIMP-XWD-BO2 - HTTP: GIMP XWD File Handling Stack Buffer Overflow2

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the GNU Image Manipulation Program (GIMP). A successful attack can lead to a buffer overflow and arbitrary remote code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:WMP-DVR-MS1 - HTTP: Microsoft Windows Media Player DVR-MS File Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Windows Media Player. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:IE:EOT-WEBFONTS-DL1 - HTTP: Internet Explorer WebFonts File Download1

Severity: MEDIUM

Description:

This signature detects the transfer of an embedded font over HTTP (eot file). This file format is known to contain some recognized vulnerabilities, which can result in a denial-of-service condition on the client system or arbitrary remote code execution. Internet Explorer is known to be vulnerable to this kind of attack.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:XLS-SERIES-TYPE-RC1 - HTTP: Microsoft Excel Series Record Parsing Type Mismatch Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Excel. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:VLC-TY-BO1 - HTTP: VideoLAN VLC Media Player TY Processing Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in the VideoLAN VLC Media Player. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server. In an unsuccessful attack, the VideoLAN VLC client application terminates unexpectedly.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:XLS-INT-OR1 - HTTP: Microsoft Excel Integer Overrun Vulnerability1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known issue with Microsoft Excel. A malformed Excel file, when opened, can result in arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:DL:XLS-FRTWRAPPER1 - HTTP: Microsoft Excel FRTWrapper Record Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known buffer overflow vulnerability in Microsoft Excel product. It is specifically due to improper parsing of Excel documents containing specially crafted FRTWrapper records. Remote attackers can exploit this by enticing target users to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In a successful attack, where arbitrary code is injected and executed on the target machine, the behavior of the target is dependent on the intention of the malicious code. In an unsuccessful attack, the vulnerable application can terminate as a result of invalid memory access. If unexpected termination of the application is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data due to the abnormal termination.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:SQL:INJ:TIVOLI-USER-UPDAT1 - HTTP: IBM Tivoli Provisioning Manager Express User.updateUserValue SQL Injection1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in IBM Tivoli Provisioning Manager. It is due to insufficient validation of user-supplied input. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:ORACLE:OUTSIDEIN-MET-BOF1 - HTTP: Oracle Outside In OS 2 Metafile Parser Stack Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Oracle Outside-In. The vulnerability is due to a boundary error while processing OS/2 Metafiles. Oracle Outside-In is embedded in many enterprise applications. This vulnerability can be exploited by causing an application that uses the vulnerable libraries to handle a malformed files. Depending on the application, user interaction may be required. Successful exploitation can result in execution of arbitrary code or a denial of service condition in the context of the affected application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:MISC:AV-INVALID-CHKSUM1 - HTTP: Multiple AV Vendor Invalid Archive Checksum Bypass1

Severity: MEDIUM

Description:

This signature detects attempts against a known vulnerability in the way multiple anti-virus products scan ZIP archive files. A malicious ZIP archive containing known trojans or viruses may be downloaded and stored on the local file system without the affected product raising a warning or otherwise informing the user of a potential threat. The product in such a case exhibits ineffective and misleading behavior.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:EXPLOIT:MAL-LNK1 - HTTP: Malformed Microsoft LNK File Download1

Severity: MEDIUM

Description:

This signature detects users downloading malformed Microsoft Windows Shortcut (LNK) files through HTTP. A successful exploit can result in a denial-of-service condition or remote code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:APACHE:MOD-ISAPI-RCE1 - HTTP: Apache HTTP Server mod_isapi Dangling Pointer Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known code execution vulnerability in Apache HTTP server. It is due an error in the mod_isapi when processing maliciously crafted HTTP requests. An attacker can exploit this to cause a memory corruption by sending a crafted HTTP request to a target server. A successful attack can lead to the execution of arbitrary code on the target server. The behavior of the target server depends entirely on the intention of the malicious code. The code executes within the security context of the affected service, which is SYSTEM. In an unsuccessful attack, the target server can terminate abnormally, resulting in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:ADOBE:WRTE-WAT-WHRE-C1 - HTTP: Adobe Flash Player Shader Object Processing Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:ADOBE:TEXTLINE-OB-CE1 - HTTP: Adobe Flash TextLine OpaqueBackground Property Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:ADOBE:SWF-INVALID-OBF1 - HTTP: Adobe Flash Player Invalid Object Reference Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:ADOBE:SWF-DMNMEM-CP1 - HTTP: Adobe Flash Player CVE-2015-0311 DomainMemory Use-after-Free1

Severity: MEDIUM

Description:

This signature detects an attempt to exploit a known vulnerability against Adobe Shockwave Flash Player. Successful exploitation could allow a remote attacker to execute arbitrary codes which could lead to code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:ADOBE:READER-ICC-RCE1 - HTTP: Adobe Acrobat Reader ICC Stream Remote Code Execution (APSB10-21)1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Adobe Acrobat Reader. A successful attack can lead to a integer overflow and arbitrary remote code execution within the context of the client.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:ADOBE:PDF-BITDEF-OF1 - HTTP: BitDefender Antivirus PDF Processing Memory Corruption1

Severity: MEDIUM

Description:

There exists a memory corruption vulnerability in multiple BitDefender products. The vulnerability is due to boundary errors within the BitDefender PDF Scanner plugin pdf.xmd. A remote attacker can exploit this vulnerability by delivering a crafted PDF file to the vulnerable system, potentially causing arbitrary code to be injected and executed in the security context of the current user. In case of a successful code injection and execution attack, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the currently logged in user. If the code injection and execution fails, a denial of service might occur due to termination of the anti-virus process, or resource exhaustion when the attack results in an infinite loop in the code. Both cases might allow for further exploitation of the target system, exposing the system to other threats in absence of the Antivirus daemon.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:MISC:MANAGENGINE-EVNTLG-CE - HTTP: ManageEngine EventLog Analyzer agentUpload Directory Traversal

Severity: HIGH

Description:

This signature detects directory traversal attempts on ManageEngine EventLog. Successful attack attempts could allow an attacker to view or overwrite sensitive system files.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • bugtraq: 69482
  • cve: CVE-2014-6037

Affected Products:

  • Zohocorp manageengine_eventlog_analyzer 9.0
  • Zohocorp manageengine_eventlog_analyzer 8.2

HTTP:INFO-LEAK:WFCHAT2 - HTTP: WFChat Information Disclosure2

Severity: HIGH

Description:

This signature detects attempts to access the files "!pwds.txt" or "!nicks.txt" on a WF-Chat server. Because access to these files is not restricted, attackers can obtain usernames and their associated passwords for the chat.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:INFO-LEAK:WFCHAT3 - HTTP: WFChat Information Disclosure3

Severity: HIGH

Description:

This signature detects attempts to access the files "!pwds.txt" or "!nicks.txt" on a WF-Chat server. Because access to these files is not restricted, attackers can obtain usernames and their associated passwords for the chat.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:INFO-LEAK:WFCHAT4 - HTTP: WFChat Information Disclosure4

Severity: HIGH

Description:

This signature detects attempts to access the files "!pwds.txt" or "!nicks.txt" on a WF-Chat server. Because access to these files is not restricted, attackers can obtain usernames and their associated passwords for the chat.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:INFO-LEAK:WFCHAT5 - HTTP: WFChat Information Disclosure5

Severity: HIGH

Description:

This signature detects attempts to access the files "!pwds.txt" or "!nicks.txt" on a WF-Chat server. Because access to these files is not restricted, attackers can obtain usernames and their associated passwords for the chat.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:INFO-LEAK:WFCHAT6 - HTTP: WFChat Information Disclosure6

Severity: HIGH

Description:

This signature detects attempts to access the files "!pwds.txt" or "!nicks.txt" on a WF-Chat server. Because access to these files is not restricted, attackers can obtain usernames and their associated passwords for the chat.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:INFO-LEAK:WFCHAT7 - HTTP: WFChat Information Disclosure7

Severity: HIGH

Description:

This signature detects attempts to access the files "!pwds.txt" or "!nicks.txt" on a WF-Chat server. Because access to these files is not restricted, attackers can obtain usernames and their associated passwords for the chat.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:INFO-LEAK:WFCHAT8 - HTTP: WFChat Information Disclosure8

Severity: HIGH

Description:

This signature detects attempts to access the files "!pwds.txt" or "!nicks.txt" on a WF-Chat server. Because access to these files is not restricted, attackers can obtain usernames and their associated passwords for the chat.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:INFO-LEAK:WFCHAT9 - HTTP: WFChat Information Disclosure9

Severity: HIGH

Description:

This signature detects attempts to access the files "!pwds.txt" or "!nicks.txt" on a WF-Chat server. Because access to these files is not restricted, attackers can obtain usernames and their associated passwords for the chat.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


APP:AVAYA-CCRWEBCLIENT-RCE - APP: Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the Avaya IP Office Customer Call Reporter. A successful attack can lead to arbitrary remote code execution within the context of the server.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • bugtraq: 54225
  • cve: CVE-2012-3811

Affected Products:

  • Avaya ip_office_customer_call_reporter 7.0
  • Avaya ip_office_customer_call_reporter 8.0

HTTP:STC:DL:REALPLAYER-SWF-BO1 - HTTP: RealPlayer SWF Frame Handling Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in RealNetworks RealPlayer. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:PHP:PHPSECUREPAGE-RFI2 - HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion2

Severity: HIGH

Description:

This signature detects attempts to exploit a known remote file inclusion vulnerability in phpSecurePages. It is due to insufficient validation of user-supplied input. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in arbitrary code execution and loss of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:PHPSECUREPAGE-RFI3 - HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion3

Severity: HIGH

Description:

This signature detects attempts to exploit a known remote file inclusion vulnerability in phpSecurePages. It is due to insufficient validation of user-supplied input. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in arbitrary code execution and loss of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:PHPSECUREPAGE-RFI4 - HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion4

Severity: HIGH

Description:

This signature detects attempts to exploit a known remote file inclusion vulnerability in phpSecurePages. It is due to insufficient validation of user-supplied input. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in arbitrary code execution and loss of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:PHPSECUREPAGE-RFI5 - HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion5

Severity: HIGH

Description:

This signature detects attempts to exploit a known remote file inclusion vulnerability in phpSecurePages. It is due to insufficient validation of user-supplied input. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in arbitrary code execution and loss of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:PHPSECUREPAGE-RFI6 - HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion6

Severity: HIGH

Description:

This signature detects attempts to exploit a known remote file inclusion vulnerability in phpSecurePages. It is due to insufficient validation of user-supplied input. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in arbitrary code execution and loss of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:PHPSECUREPAGE-RFI7 - HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion7

Severity: HIGH

Description:

This signature detects attempts to exploit a known remote file inclusion vulnerability in phpSecurePages. It is due to insufficient validation of user-supplied input. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in arbitrary code execution and loss of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:PHPSECUREPAGE-RFI8 - HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion8

Severity: HIGH

Description:

This signature detects attempts to exploit a known remote file inclusion vulnerability in phpSecurePages. It is due to insufficient validation of user-supplied input. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in arbitrary code execution and loss of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:PHPSECUREPAGE-RFI9 - HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion9

Severity: HIGH

Description:

This signature detects attempts to exploit a known remote file inclusion vulnerability in phpSecurePages. It is due to insufficient validation of user-supplied input. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in arbitrary code execution and loss of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:IE:COMPRESSED-URL - HTTP: Microsoft Internet Explorer Compressed Content URL Heap Overflow

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in Microsoft Internet Explorer. A successful attack can lead to a heap overflow and arbitrary remote code execution within the context of the server.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 19987
  • cve: CVE-2006-3873

Affected Products:

  • Microsoft internet_explorer 6.0
  • Microsoft internet_explorer 5.0.1 SP4
  • Microsoft internet_explorer 6.0 SP1

HTTP:HP-SITESCOPE-INF-DISC - HTTP: HP SiteScope Log Analyzer Information Disclosure

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in HP SiteScope. Successful exploitation would allow the authenticated attacker to gain administrator role privileges.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • cve: CVE-2015-2120

Affected Products:

  • Hp sitescope 11.30.521
  • Hp sitescope 11.13
  • Hp sitescope 11.24.391

HTTP:MISC:ENDIAN-PRX-CMDEXEC - HTTP: Endian Firewall Proxy Password Change Command Execution

Severity: HIGH

Description:

This signature detects an attempt to exploit a known vulnerability against Endian Firewall Proxy application. Successful exploitation could allow an attacker to perform remote code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • cve: CVE-2015-5082

Affected Products:

  • Endian_firewall endian_firewall 2.5.1

APP:HP-PM-EXP-DATA-LOGS - APP: HP Power Manager formExportDataLogs Buffer Overflow

Severity: HIGH

Description:

This signature detects attempts to exploit a known buffer overflow vulnerability in HP Power Manager. It is due to insufficient bounds checking in the HP Power Manager while processing URL parameters. In a successful code execution attack the injected code is executed within the security context of the SYSTEM user. An unsuccessful exploit attempt can terminate the affected service abnormally and result in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 37866
  • cve: CVE-2009-3999

Affected Products:

  • Hp power_manager 4.0Build10
  • Hp power_manager 4.0Build11
  • Hp power_manager 4.2.9
  • Hp power_manager 4.2.7
  • Hp power_manager

HTTP:SQL:INJ:WP-AJAX-CATEGORY2 - HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 2

Severity: HIGH

Description:

This signature detects attempts to exploit a known SQL injection vulnerability in the WordPress Ajax Category Dropdown Plugin. It is due to insufficient validation of a parameter sent to the dhat-ajax-cat-dropdown-request.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:SCHNEIDER-CFG-FILE-BO1 - HTTP: Schneider Electric VAMPSET CFG File Handling Buffer Overflow 1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Schneider. A successful exploit can lead to buffer overflow and remote code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:PHP:YABBSE-PKG-EXEC3 - HTTP: YabbSE Packages.php Code Execution3

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Packages.php in YabbSE. YabbSE 1.5.0 and earlier are vulnerable. Attackers can include remote malicious code in Packages.php that can allow them to execute arbitrary commands with Web server privileges.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:YABBSE-PKG-EXEC4 - HTTP: YabbSE Packages.php Code Execution4

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Packages.php in YabbSE. YabbSE 1.5.0 and earlier are vulnerable. Attackers can include remote malicious code in Packages.php that can allow them to execute arbitrary commands with Web server privileges.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:YABBSE-PKG-EXEC5 - HTTP: YabbSE Packages.php Code Execution5

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Packages.php in YabbSE. YabbSE 1.5.0 and earlier are vulnerable. Attackers can include remote malicious code in Packages.php that can allow them to execute arbitrary commands with Web server privileges.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:YABBSE-PKG-EXEC6 - HTTP: YabbSE Packages.php Code Execution6

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Packages.php in YabbSE. YabbSE 1.5.0 and earlier are vulnerable. Attackers can include remote malicious code in Packages.php that can allow them to execute arbitrary commands with Web server privileges.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:YABBSE-PKG-EXEC7 - HTTP: YabbSE Packages.php Code Execution7

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Packages.php in YabbSE. YabbSE 1.5.0 and earlier are vulnerable. Attackers can include remote malicious code in Packages.php that can allow them to execute arbitrary commands with Web server privileges.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:YABBSE-PKG-EXEC8 - HTTP: YabbSE Packages.php Code Execution8

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Packages.php in YabbSE. YabbSE 1.5.0 and earlier are vulnerable. Attackers can include remote malicious code in Packages.php that can allow them to execute arbitrary commands with Web server privileges.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PHP:YABBSE-PKG-EXEC9 - HTTP: YabbSE Packages.php Code Execution9

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Packages.php in YabbSE. YabbSE 1.5.0 and earlier are vulnerable. Attackers can include remote malicious code in Packages.php that can allow them to execute arbitrary commands with Web server privileges.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:SQL:INJ:WP-AJAX-CATEGORY3 - HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 3

Severity: HIGH

Description:

This signature detects attempts to exploit a known SQL injection vulnerability in the WordPress Ajax Category Dropdown Plugin. It is due to insufficient validation of a parameter sent to the dhat-ajax-cat-dropdown-request.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:SQL:INJ:WP-AJAX-CATEGORY4 - HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 4

Severity: HIGH

Description:

This signature detects attempts to exploit a known SQL injection vulnerability in the WordPress Ajax Category Dropdown Plugin. It is due to insufficient validation of a parameter sent to the dhat-ajax-cat-dropdown-request.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:SQL:INJ:WP-AJAX-CATEGORY5 - HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 5

Severity: HIGH

Description:

This signature detects attempts to exploit a known SQL injection vulnerability in the WordPress Ajax Category Dropdown Plugin. It is due to insufficient validation of a parameter sent to the dhat-ajax-cat-dropdown-request.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:SQL:INJ:WP-AJAX-CATEGORY6 - HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 6

Severity: HIGH

Description:

This signature detects attempts to exploit a known SQL injection vulnerability in the WordPress Ajax Category Dropdown Plugin. It is due to insufficient validation of a parameter sent to the dhat-ajax-cat-dropdown-request.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:SQL:INJ:WP-AJAX-CATEGORY7 - HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 7

Severity: HIGH

Description:

This signature detects attempts to exploit a known SQL injection vulnerability in the WordPress Ajax Category Dropdown Plugin. It is due to insufficient validation of a parameter sent to the dhat-ajax-cat-dropdown-request.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:SQL:INJ:WP-AJAX-CATEGORY8 - HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 8

Severity: HIGH

Description:

This signature detects attempts to exploit a known SQL injection vulnerability in the WordPress Ajax Category Dropdown Plugin. It is due to insufficient validation of a parameter sent to the dhat-ajax-cat-dropdown-request.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:SQL:INJ:WP-AJAX-CATEGORY9 - HTTP: WordPress Ajax Category Dropdown Plugin SQL Injection 9

Severity: HIGH

Description:

This signature detects attempts to exploit a known SQL injection vulnerability in the WordPress Ajax Category Dropdown Plugin. It is due to insufficient validation of a parameter sent to the dhat-ajax-cat-dropdown-request.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:SAFARI:X-MAN-PAGE-RCE2 - HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 2

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Mac OS X Safari. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:SAFARI:X-MAN-PAGE-RCE3 - HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 3

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Mac OS X Safari. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:SAFARI:X-MAN-PAGE-RCE4 - HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 4

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Mac OS X Safari. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:SAFARI:X-MAN-PAGE-RCE5 - HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 5

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Mac OS X Safari. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:SAFARI:X-MAN-PAGE-RCE6 - HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 6

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Mac OS X Safari. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:SAFARI:X-MAN-PAGE-RCE7 - HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 7

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Mac OS X Safari. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:SAFARI:X-MAN-PAGE-RCE8 - HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 8

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Mac OS X Safari. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:SAFARI:X-MAN-PAGE-RCE9 - HTTP: Mac OS X Safari x-man-page URI Terminal Escape Command Execution 9

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Mac OS X Safari. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


APP:VMWARE-ISAPI-DOS - APP: VMware Server ISAPI Extension Remote Denial Of Service

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the ISAPI extension provided by VMware Server to extend support to IIS for running Perl scripts. By supplying overly large data to the ISAPI extension iisperl.dll in a POST request, a remote attacker can terminate the IIS service and create a denial-of -service condition. Upon processing malicious POST request, the affected IIS server process terminates, which triggers a denial-of-service condition. On most installations, the service restarts automatically to resume the normal operation.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • bugtraq: 30935
  • cve: CVE-2008-3697

Affected Products:

  • Vmware server 1.0.7
  • Vmware server 1.0.7 Build 108231

HTTP:STC:ADOBE:READER-PLUGIN2 - HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption2

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader 7.0 through 7.0.8. A successful attack can result in a denial-of-service condition or possible arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:ADOBE:READER-PLUGIN3 - HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption3

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader 7.0 through 7.0.8. A successful attack can result in a denial-of-service condition or possible arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:DL:PPT-VIEWER-MEMALLO1 - HTTP: Microsoft PowerPoint Viewer Memory Allocation Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft PowerPoint Viewer. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:STC:ADOBE:READER-PLUGIN5 - HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption5

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader 7.0 through 7.0.8. A successful attack can result in a denial-of-service condition or possible arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:ADOBE:READER-PLUGIN6 - HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption6

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader 7.0 through 7.0.8. A successful attack can result in a denial-of-service condition or possible arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:ADOBE:READER-PLUGIN7 - HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption7

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader 7.0 through 7.0.8. A successful attack can result in a denial-of-service condition or possible arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:ADOBE:READER-PLUGIN8 - HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption8

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader 7.0 through 7.0.8. A successful attack can result in a denial-of-service condition or possible arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:ADOBE:READER-PLUGIN9 - HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption9

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader 7.0 through 7.0.8. A successful attack can result in a denial-of-service condition or possible arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:DL:XLS-SERIES2 - HTTP: Microsoft Excel Malformed Series Record Remote Code Execution2

Severity: HIGH

Description:

This signature detects attempts to exploit a known issue with Microsoft Excel. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:APACHE:MOD-ISAPI-RCE - HTTP: Apache HTTP Server mod_isapi Dangling Pointer Remote Code Execution

Severity: CRITICAL

Description:

This signature detects attempts to exploit a known code execution vulnerability in Apache HTTP server. It is due an error in the mod_isapi when processing maliciously crafted HTTP requests. An attacker can exploit this to cause a memory corruption by sending a crafted HTTP request to a target server. A successful attack can lead to the execution of arbitrary code on the target server. The behavior of the target server depends entirely on the intention of the malicious code. The code executes within the security context of the affected service, which is SYSTEM. In an unsuccessful attack, the target server can terminate abnormally, resulting in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 38494
  • cve: CVE-2010-0425

Affected Products:

  • Apache_software_foundation apache 2.2.5
  • Ibm websphere_application_server 7.0.0.7
  • Apache_software_foundation apache 2.2.7-Dev
  • Fujitsu interstage_application_server_standard-j_edition 9.0.0A
  • Ibm websphere_application_server 6.1.0.2
  • Avaya aura_application_enablement_services 4.2.1
  • Sun opensolaris Build Snv 99
  • Ibm websphere_application_server 7.0.0.9
  • Avaya aura_application_enablement_services 4.1
  • Sun opensolaris Build Snv 74
  • Apache_software_foundation apache 2.0.63
  • Ibm websphere_application_server 6.1.0
  • Sun opensolaris Build Snv 101A
  • Apache_software_foundation apache 2.0.62-Dev
  • Sun opensolaris Build Snv 91
  • Sun opensolaris Build Snv 57
  • Sun opensolaris Build Snv 28
  • Sun opensolaris Build Snv 103
  • Sun opensolaris Build Snv 50
  • Kolab kolab_groupware_server 2.2-Rc1
  • Ibm websphere_application_server 7.0.0.5
  • Apache_software_foundation apache 2.0.52
  • Apache_software_foundation apache 2.2
  • Ibm websphere_application_server 7.0.0.8
  • Ibm websphere_application_server 6.1.0.22
  • Apache_software_foundation apache 2.0.40
  • Apache_software_foundation apache 2.0.49
  • Ibm websphere_application_server 7.0
  • Ibm websphere_application_server 7.0.0.1
  • Apache_software_foundation apache 2.2.14
  • Sun opensolaris Build Snv 71
  • Sun solaris 10 Sparc
  • Apache_software_foundation apache 2.2.13
  • Sun opensolaris Build Snv 49
  • Red_hat fedora 11
  • Slackware linux 13.0
  • Apache_software_foundation apache 2.0.55
  • Sun opensolaris Build Snv 108
  • Avaya intuity_audix_lx 2.0 SP1
  • Avaya intuity_audix_lx 2.0 SP2
  • Sun opensolaris Build Snv 67
  • Apache_software_foundation apache 2.0.57
  • Avaya aura_session_manager 1.1
  • Avaya communication_manager 5.1.2
  • Ibm websphere_application_server 6.1.0.9
  • Fujitsu interstage_application_server_enterprise_edition 9.0.0
  • Ibm websphere_application_server 6.1.0.23
  • Ibm websphere_application_server 6.1.0.13
  • Ibm websphere_application_server 7.0.0.3
  • Ibm websphere_application_server 6.1.0.3
  • Kolab kolab_groupware_server 2.2 Beta3
  • Fujitsu interstage_studio_enterprise_edition 9.0.0
  • Fujitsu interstage_studio_standard-j_edition 9.0.0
  • Apache_software_foundation apache 2.2.11
  • Apache_software_foundation apache 2.2.6
  • Apache_software_foundation apache 2.0.54
  • Slackware linux 13.0 X86 64
  • Sun opensolaris Build Snv 22
  • Avaya voice_portal 4.1 SP1
  • Avaya voice_portal 4.1 SP2
  • Sun opensolaris Build Snv 19
  • Avaya voice_portal 5.0
  • Avaya meeting_exchange 5.0 SP1
  • Avaya meeting_exchange 5.0 SP2
  • Avaya meeting_exchange 5.1 SP1
  • Red_hat jboss_enterprise_web_server_for_rhel_5_server 1.0.0
  • Apache_software_foundation apache 2.0.59
  • Apache_software_foundation apache 2.0.45
  • Sun opensolaris Build Snv 64
  • Sun opensolaris Build Snv 13
  • Apache_software_foundation apache 2.0.56 -Dev
  • Ibm websphere_application_server 6.1.0.25
  • Sun opensolaris Build Snv 110
  • Sun opensolaris Build Snv 111
  • Kolab kolab_groupware_server 2.2.2
  • Apache_software_foundation apache 2.2.4
  • Avaya meeting_exchange 5.2
  • Avaya communication_manager 5.0 SP3
  • Apache_software_foundation apache 2.2.9
  • Apache_software_foundation apache 2.2.8
  • Avaya communication_manager 5.1
  • Vmware ace_management_server_(ams)_for_windows
  • Avaya communication_manager 4.0.3 SP1
  • Avaya communication_manager 5.0
  • Avaya intuity_audix_lx 2.0
  • Ibm http_server 2.0.47
  • Sun opensolaris Build Snv 68
  • Sun opensolaris Build Snv 36
  • Sun opensolaris Build Snv 54
  • Sun opensolaris Build Snv 51
  • Ibm websphere_application_server 6.1.0.17
  • Avaya communication_manager 5.2
  • Avaya aura_sip_enablement_services 5.2
  • Ibm http_server 2.0.47 .1
  • Sun opensolaris Build Snv 101
  • Avaya aura_sip_enablement_services 4.0
  • Avaya aura_application_enablement_services 4.2
  • Avaya aura_application_enablement_services 4.2.2
  • Apache_software_foundation apache 2.0.39
  • Apache_software_foundation apache 2.0.38
  • Apache_software_foundation apache 2.0.37
  • Sun opensolaris Build Snv 100
  • Apache_software_foundation apache 2.0.51
  • Avaya meeting_exchange 5.1
  • Avaya message_networking 5.2
  • Apache_software_foundation apache 2.2.1
  • Ibm websphere_application_server 6.1.0.5
  • Avaya message_networking 3.1
  • Apache_software_foundation apache 2.0.46
  • Slackware linux 12.1
  • Sun opensolaris Build Snv 84
  • Sun solaris 10 X86
  • Ibm websphere_application_server 6.1.0.4
  • Apache_software_foundation apache 2.0.58
  • Kolab kolab_groupware_server 2.2 Beta1
  • Avaya aura_application_enablement_services 4.0.1
  • Rpath rpath_linux 1
  • Apache_software_foundation apache 2.0.44
  • Apache_software_foundation apache 2.0.50
  • Fujitsu interstage_application_server_standard-j_edition 9.1.0
  • Avaya aura_application_enablement_services 4.0
  • Sun opensolaris Build Snv 80
  • Sun opensolaris Build Snv 01
  • Sun opensolaris
  • Sun opensolaris Build Snv 93
  • Fujitsu interstage_application_server_enterprise_edition 9.2.0
  • Fujitsu interstage_application_server_standard-j_edition 9.2.0
  • Fujitsu interstage_studio_enterprise_edition 9.1.0
  • Fujitsu interstage_studio_enterprise_edition 9.1.0 B
  • Fujitsu interstage_studio_enterprise_edition 9.2.0
  • Fujitsu interstage_studio_standard-j_edition 9.1.0
  • Fujitsu interstage_studio_standard-j_edition 9.1.0 B
  • Fujitsu interstage_studio_standard-j_edition 9.2.0
  • Apache_software_foundation apache 2.2.3
  • Ibm websphere_application_server 6.1.0.29
  • Ibm websphere_application_server 6.1.0.6
  • Ibm websphere_application_server 6.1.0.7
  • Sun opensolaris Build Snv 88
  • Apache_software_foundation apache 2.2.2
  • Apache_software_foundation apache 2.0.43
  • Apache_software_foundation apache 2.2.0
  • Sun opensolaris Build Snv 02
  • Slackware linux X86 64 -Current
  • Fujitsu interstage_application_server_standard-j_edition 9.0.0
  • Slackware linux 12.0
  • Fujitsu interstage_application_server_enterprise_edition 9.0.0A
  • Kolab kolab_groupware_server 2.2.3
  • Sun opensolaris Build Snv 38
  • Kolab kolab_groupware_server 2.2-Rc3
  • Ibm websphere_application_server 6.1.0.11
  • Sun opensolaris Build Snv 87
  • Sun opensolaris Build Snv 89
  • Slackware linux -Current
  • Sun opensolaris Build Snv 59
  • Blue_coat_systems director 5.5
  • Sun opensolaris Build Snv 86
  • Sun opensolaris Build Snv 35
  • Sun opensolaris Build Snv 56
  • Sun opensolaris Build Snv 94
  • Blue_coat_systems director 4.2.2.4
  • Blue_coat_systems director 5.2.2.5
  • Sun opensolaris Build Snv 45
  • Sun opensolaris Build Snv 111A
  • Apache_software_foundation apache 2.2.10
  • Gentoo linux
  • Apache_software_foundation apache 2.0.48
  • Sun opensolaris Build Snv 109
  • Apache_software_foundation apache 2.0.61-Dev
  • Apache_software_foundation apache 2.2.6-Dev
  • Rpath appliance_platform_linux_service 1
  • Ibm websphere_application_server 6.1.0.8
  • Sun opensolaris Build Snv 96
  • Red_hat jboss_enterprise_web_server_for_rhel_4_es 1.0.0
  • Kolab kolab_groupware_server 2.2 -Rc2
  • Avaya aura_sip_enablement_services 3.1
  • Sun opensolaris Build Snv 90
  • Sun opensolaris Build Snv 48
  • Ibm websphere_application_server 6.1.0.27
  • Apache_software_foundation apache 2.0.41
  • Apache_software_foundation apache 2.0.42
  • Avaya meeting_exchange 5.2 SP1
  • Red_hat certificate_server 7.3
  • Avaya aura_session_manager 5.2
  • Red_hat jboss_enterprise_web_server_for_rhel_4_as 1.0.0
  • Sun opensolaris Build Snv 81
  • Apache_software_foundation apache 2.0.53
  • Fujitsu interstage_application_server_enterprise_edition 9.1.0
  • Sun opensolaris Build Snv 95
  • Sun opensolaris Build Snv 47
  • Sun opensolaris Build Snv 83
  • Sun opensolaris Build Snv 82
  • Avaya communication_manager 4.0
  • Ibm websphere_application_server 6.1.0.19
  • Ibm websphere_application_server 6.1.0.14
  • Avaya aura_application_enablement_services 5.2
  • Apache_software_foundation apache 2.0.60-Dev
  • Sun opensolaris Build Snv 98
  • Ibm websphere_application_server 6.1.0.12
  • Apache_software_foundation apache 2.2.5-Dev
  • Sun opensolaris Build Snv 37
  • Avaya aura_sip_enablement_services 5.1
  • Blue_coat_systems director
  • Avaya meeting_exchange 5.0
  • Avaya voice_portal 4.0
  • Avaya voice_portal 4.1
  • Kolab kolab_groupware_server 2.2.0
  • Sun opensolaris Build Snv 111B
  • Sun opensolaris Build Snv 102
  • Sun opensolaris Build Snv 39
  • Sun opensolaris Build Snv 92
  • Sun opensolaris Build Snv 76
  • Sun opensolaris Build Snv 77
  • Ibm websphere_application_server 6.1.0.1
  • Apache_software_foundation apache 2.2.12
  • Avaya voice_portal 5.1
  • Sun opensolaris Build Snv 78
  • Blue_coat_systems director 5.4
  • Avaya aura_sip_enablement_services 5.0
  • Sun opensolaris Build Snv 85
  • Apache_software_foundation apache 2.0.47
  • Sun opensolaris Build Snv 104
  • Sun opensolaris Build Snv 105
  • Ibm websphere_application_server 6.1.0.15
  • Slackware linux 12.2
  • Sun opensolaris Build Snv 58
  • Sun opensolaris Build Snv 41
  • Fujitsu interstage_application_server_enterprise_edition 9.1.0B
  • Fujitsu interstage_application_server_standard-j_edition 9.1.0B
  • Ibm websphere_application_server 6.1.0.18
  • Sun opensolaris Build Snv 29
  • Ibm websphere_application_server 6.1.0.20
  • Ibm websphere_application_server 6.1.0.21
  • Fujitsu interstage_application_server_standard-j_edition 9.0.0 B
  • Ibm websphere_application_server 6.1.0.10
  • Ibm http_server 6.1.0
  • Sun opensolaris Build Snv 61
  • Sun opensolaris Build Snv 106
  • Sun opensolaris Build Snv 107

HTTP:STC:DL:XLS-SERIES4 - HTTP: Microsoft Excel Malformed Series Record Remote Code Execution4

Severity: HIGH

Description:

This signature detects attempts to exploit a known issue with Microsoft Excel. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:XLS-SERIES5 - HTTP: Microsoft Excel Malformed Series Record Remote Code Execution5

Severity: HIGH

Description:

This signature detects attempts to exploit a known issue with Microsoft Excel. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:XLS-SERIES6 - HTTP: Microsoft Excel Malformed Series Record Remote Code Execution6

Severity: HIGH

Description:

This signature detects attempts to exploit a known issue with Microsoft Excel. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:DIR:APJS-PORTAL-DIRTRAV - HTTP: Apache Jetspeed Portal Site Manager ZIP File Upload Directory Traversal

Severity: MEDIUM

Description:

This signature detects an attempt to exploit a known vulnerability against Apache Jetspeed Site Manager. Successful exploitation could allow an attacker to launch further attacks through crafted requests while uploading certain malicious archive files.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • url: https://portals.apache.org/jetspeed-2/security-reports.html#cve-2016-0709
  • cve: CVE-2016-0709

Affected Products:

  • Apache jetspeed 2.3.0

HTTP:STC:DL:XLS-SERIES8 - HTTP: Microsoft Excel Malformed Series Record Remote Code Execution8

Severity: HIGH

Description:

This signature detects attempts to exploit a known issue with Microsoft Excel. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:XLS-SERIES9 - HTTP: Microsoft Excel Malformed Series Record Remote Code Execution9

Severity: HIGH

Description:

This signature detects attempts to exploit a known issue with Microsoft Excel. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DOTNET-BUFF-ALLOC2 - HTTP: .NET Framework Buffer Allocation Vulnerability2

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against .NET runtime environment. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:DOTNET-BUFF-ALLOC3 - HTTP: .NET Framework Buffer Allocation Vulnerability3

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against .NET runtime environment. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:DOTNET-BUFF-ALLOC4 - HTTP: .NET Framework Buffer Allocation Vulnerability4

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against .NET runtime environment. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:DOTNET-BUFF-ALLOC5 - HTTP: .NET Framework Buffer Allocation Vulnerability5

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against .NET runtime environment. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:DOTNET-BUFF-ALLOC6 - HTTP: .NET Framework Buffer Allocation Vulnerability6

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against .NET runtime environment. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:DOTNET-BUFF-ALLOC7 - HTTP: .NET Framework Buffer Allocation Vulnerability7

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against .NET runtime environment. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:DOTNET-BUFF-ALLOC8 - HTTP: .NET Framework Buffer Allocation Vulnerability8

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against .NET runtime environment. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:DOTNET-BUFF-ALLOC9 - HTTP: .NET Framework Buffer Allocation Vulnerability9

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against .NET runtime environment. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


APP:ORACLE:GOLDENGATE-SOAP-OF - APP: Oracle GoldenGate Veridata Server XML SOAP Request Buffer Overflow

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the Oracle GoldenGate Veridata Server. Its due to a boundary error while parsing XML SOAP requests containing an overly long tag string. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 45868
  • cve: CVE-2010-4416

Affected Products:

  • Oracle goldengate_veridata 3.0.0.4

HTTP:DIR:APACHE-OPENMEETINGS - HTTP: Apache OpenMeetings ZIP File Path Traversal

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability againstApache OpenMeetings. A successful attack can lead to allow traversing outside of a restricted path.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2016-0784

Affected Products:

  • Apache openmeetings 3.1.0

HTTP:DIR:VISUALMINING-NETCHARTS - HTTP: Visual Mining NetCharts Server File Upload Directory Traversal

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Visual Mining NetCharts Server. A remote attacker can exploit this vulnerability to execute arbitrary code on the affected system by uploading arbitrary files to certain locations.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2014-8516

APP:MISC:HP-SITESCOPE-CE - APP: HP SiteScope issueSiebelCmd SOAP Request Handling

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against HP SiteScope. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2013-4835

Affected Products:

  • Hp sitescope 11.21
  • Hp sitescope 11.01
  • Hp sitescope 11.1
  • Hp sitescope 11.12
  • Hp sitescope 10.13
  • Hp sitescope 11.11
  • Hp sitescope 11.20
  • Hp sitescope 11.10
  • Hp sitescope 10.11

HTTP:STC:ADOBE:READER-PLUGIN4 - HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption4

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader 7.0 through 7.0.8. A successful attack can result in a denial-of-service condition or possible arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:DIR:MANAGEENGINE-DIR-TRA - HTTP: ManageEngine ServiceDesk File Upload Directory Traversal

Severity: HIGH

Description:

This signature detects attempts to exploit a known flaw in ManageEngine ServiceDesk. A successful attack can result in directory traversal attacks.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


APP:MISC:HP-SSC-APIMONITORIMPL - APP: HP SiteScope SOAP Call APIMonitorImpl Security Bypass

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against HP SiteScope. A successful attack can lead to unauthorized information disclosure.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2012-3260

Affected Products:

  • Hp sitescope 11.12
  • Hp sitescope 11.10
  • Hp sitescope 11.11

HTTP:WINAMP-WLZ-BO1 - HTTP: Winamp wlz File Parsing Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Winamp. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:INTELLITAMPER-DEFER-BO1 - HTTP: IntelliTamper defer Attribute Buffer Overflow Vulnerability1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in the IntelliTamper application. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:MICROSOFT-WORKS-WKSSS-BO1 - HTTP: Microsoft Works wksss Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Microsoft Works. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:ACMS-ASSETS-INFODISC1 - HTTP: aCMS Assets Page Information Disclosure1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known issue in aCMS. A successful exploit could allow the attacker to get access to sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:FOXIT-PNG-PDF-BO11 - HTTP: Foxit Multiple Products PNG To PDF Conversion Heap Buffer Overflow1

Severity: MEDIUM

Description:

A heap buffer overflow vulnerability exists in Foxit Reader. Successful exploitation would result in execution of arbitrary code in the security context of the target user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:ADOBE-INDESIGN-SOAP-RCE1 - HTTP: Adobe IndesignServer SOAP Server Arbitrary Script Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Adobe IndesignServer. A successful attack can lead to arbitrary script code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:MAMBO-MYSQL-INF-DISCLOSUR1 - HTTP: Mambo MySQL Database Info Disclosure1

Severity: MEDIUM

Description:

Mambo CMS is prone to a password disclosure vulnerability. Local attackers can exploit this issue to disclose sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:MS-WINDOWS-HYPERLINK-BO1 - HTTP: Microsoft Windows Hyperlink Buffer Overflow1

Severity: MEDIUM

Description:

A buffer overflow exists in the Microsoft Windows system library used to handle hyperlink objects. An unchecked buffer in the Microsoft Object Library is vulnerable to attack when malformed hyperlinks are processed when a user clicks on a hyperlink in a browser or in HTML-rendered email. An attacker who successfully exploits this vulnerability can execute code with the privileges of the currently logged in user. In a simple attack case, the attacker can terminate the application that is using the ActiveX hyperlink library. In a sophisticated attack, he can inject arbitrary code into the target. The behaviour of the target is dependent on the nature of the malicious code. The exploit executes with the privileges of the currently logged in user. If this account has elevated privileges, an attacker may take control of the target system.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:WIRELURKER-VRUPDATE1 - HTTP: WireLurker Version Update Detected1

Severity: MEDIUM

Description:

This signature detects attempts from WireLurker malware to update itself from an infected client system.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:OFFICESCAN-CGIRECVFILE1 - HTTP: Trend Micro OfficeScan Server cgiRecvFile Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known buffer overflow vulnerability in Trend Micro's OfficeScan. It is due to a boundary error when handling HTTP requests. An unauthenticated remote attacker can leverage this to inject and execute arbitrary code with System level privileges on the target system. In a successful code injection and execution attack, the behavior of the target is entirely dependent on the intended function of the injected code. In an unsuccessful attack, the CGI process initiated for the session terminates abnormally.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:KASPERSKY-URI-PARSING-DOS1 - HTTP: Kaspersky Products URI Parsing Denial of Service1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Kaspersky Products. A successful attack can result in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:REALTEK-MEDIAPLAYER-PLA-B1 - HTTP: Realtek Media Player pla File Parsing Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in the Realtek Media Player. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:IESHIMS-DLL-HIJACK1 - HTTP: Microsoft Internet Explorer IESHIMS.DLL Insecure Library Loading1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known remote code execution vulnerability in Microsoft Internet Explorer. It is due to a design weakness in loading Dynamically Linked Libraries. Remote attackers can exploit this by enticing target users to download a malicious "IESHIMS.DLL" file. A successful attack can result in loading the attacker-controlled library and execution of arbitrary code with the privileges of the logged-in user. If a user is logged-on with administrative user rights, an attacker can take complete control of the affected system.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:MANAGENGINE-APP1 - HTTP: ManageEngine Applications Manager SQL Injection1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in ManageEngine. It is due to insufficient validation of user-supplied input. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:CGI:OFFICESCAN-CGI-BO - HTTP: Trend Micro OfficeScan Multiple CGI Modules HTTP Form Processing Buffer Overflow

Severity: HIGH

Description:

This signature detects attempts to exploit a known buffer overflow vulnerability in Trend Micro's OfficeScan. It is due to a boundary error when handling HTTP requests. An unauthenticated remote attacker can leverage this to inject and execute arbitrary code with System level privileges on the target system. In a successful code injection and execution attack, the behavior of the target is entirely dependent on the intended function of the injected code. If the code execution is not achieved, the CGI process initiated for the session terminates abnormally.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 31859
  • cve: CVE-2008-3862

Affected Products:

  • Trend_micro officescan 7.3
  • Trend_micro officescan 8.0
  • Trend_micro officescan 8.0 SP 1 Patch 1

HTTP:HP-INSIGHT-DIAGNOSTICS-LF1 - HTTP: HP Insight Diagnostics CVE-2013-3575 Local File Inclusion1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known local file inclusion vulnerability in HP Insight Diagnostics. It is due to insufficient validation of user-supplied input. A successful attack can result in loss of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PFSENSE-ZONE-CSS1 - HTTP: pfSense WebGUI Zone Parameter Cross-Site Scripting1

Severity: MEDIUM

Description:

A cross-site scripting vulnerability has been reported in pfSense. The vulnerability is due to services_captiveportal_zones.php not validating the zone parameter when the act parameter is set to del. A remote attacker can exploit this vulnerability by enticing a user to open a specially crafted link. Successful exploitation will result in the attacker-controlled script code being executed in the target user's browser in the context of the affected site.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:FIREFLY-MEDIA-SERVER-DOS1 - HTTP: Firefly Media Server Denial Of Service1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Firefly Media Server. A successful attack can result in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:NOVELL-NETIQ-MOD-POLBYPAS1 - HTTP: Novell NetIQ Privileged User Manager modifyAccounts Policy Bypass1

Severity: MEDIUM

Description:

This signature detects a known policy bypass vulnerability in the Novell NetIQ Privileged User Manager. It is due to an access control weakness when handling a modifyAccounts request. A remote, unauthenticated attacker can exploit this vulnerability by sending a malicious request to a vulnerable server. Successful exploitation could result in code execution under the context of SYSTEM.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:MS-IE-MEMORY-CORRUPTION1 - HTTP: Microsoft Internet Explorer CVE-2014-2782 Use After Free1

Severity: MEDIUM

Description:

Microsoft Internet Explorer has been reported with memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution in the security context of the target user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:INTEGARD-PASSWORD-BOF1 - HTTP: Integard Web Interface Password Parameter Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Integard web interface. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the SYSTEM user, possibly leading to a complete compromise of the targeted server.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:FORTINET-HELLO-MSG-DOS1 - HTTP: Fortinet Single Sign On Hello Message Denial Of Service1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Fortinet. A successful exploit can lead to denial of service in the context of the application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:NGINX-RQST-URI-SECBYPASS1 - HTTP: Nginx Request URI Verification Security Bypass1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Nginx. The vulnerability is caused by improper handling of unescaped space characters within URIs. A successful attack could bypass security restrictions in certain configurations.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


APP:MISC:HP-SITESCOPE-LOADFILE - APP: HP SiteScope loadFileContent SOAP Request Information Disclosure

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against HP SiteScope. A successful attack can lead to unauthorized information disclosure.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 55269

HTTP:STC:IMG:JPEG-WIDTH-OF1 - HTTP: Internet Explorer Overlarge JPEG (Width)1

Severity: MEDIUM

Description:

This signature detects JPEG files wider than the maximum limit allowed by Microsoft's Internet Explorer. This limit affects IE 6 and below. Attempting to view JPEG files exceeding this limit crashes Internet Explorer and could allow an attacker to run arbitrary code on the viewing computer.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:SPRING-XMLENTITY-INFODISC1 - HTTP: SpringSource Spring Framework XML External Entity Parsing Information Disclosure1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a know vulnerability against SpringSource Spring Framework. The vulnerability is due to incorrectly configured XML parsing which accepts XML external entities from untrusted sources. A remote, unauthenticated attacker can leverage this vulnerability by sending a malicious request to the target server. Successful exploitation would result in the disclosure of information from arbitrary files available to the security context of the server application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:WIRESHARK-MPEG-BOF11 - HTTP: Wireshark MPEG Dissector Stack Buffer Overflow11

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Wireshark. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:XLS-SERIES3 - HTTP: Microsoft Excel Malformed Series Record Remote Code Execution3

Severity: HIGH

Description:

This signature detects attempts to exploit a known issue with Microsoft Excel. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:RESIN-INFO-DISCLOSURE1 - HTTP: Resin Application Server Source Code Disclosure1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Resin application server. This may allow a remote attacker to gain access to arbitrary JSP files.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:UNUSUAL-REFERER1 - HTTP: Unusual Value In HTTP Referer Header1

Severity: MEDIUM

Description:

This signature detects unusual values for the "Referer" field in an HTTP request. Some malware will hard-code illegal or unusual values in their requests to Command & Control servers, while others will use such headers in their HTTP DDoS requests to victims. The source IP may be infected with a bot and should be investigated.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:C99-SHELL-BACKDOOR1 - TROJAN: C99 Backdoor Actiivity1

Severity: MEDIUM

Description:

This signature detects access to the backdoor placed in the C99 PHP shell. It was found that the C99 PHP Shell that is used to backdoor web servers, has a backdoor itself. This signature indicates that someone is logging into a C99 shell using the backdoor.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:MS-OFFICE-STRING1 - HTTP: Microsoft Office Malformed String Parsing Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Office. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:TRENDMICRO-CTRLMGR-SQLINJ1 - HTTP: Trend Micro Control Manager ad hoc query Module SQL Injection1

Severity: MEDIUM

Description:

This signature detects attempts to exploit known vulnerability against Trend Micro Control Manager. An attacker can exploit this vulnerability to submit crafted SQL queries to the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:FOXIT-FF-URL-STG-BO1 - HTTP: Foxit Reader Plugin for Firefox URL String Stack Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known flaw in Foxit Reader Plugin for Firefox. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:SUN-GLASSFISH-AUTH-BP1 - HTTP: Sun Goldfish AUthentication Bypass1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Sun Goldfish. A successful exploit can lead to Authentication Bypass.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:EMC-DPA-EJBSERVLET-RCE1 - HTTP: EMC Data Protection Advisor Illuminator EJBInvokerServlet Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against EMC Data Protection Advisor. A successful attack can lead to arbitrary code execution with SYSTEM privileges.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:HP-SITESCOPE-INF-DISC1 - HTTP: HP SiteScope Log Analyzer Information Disclosure1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in HP SiteScope. Successful exploitation would allow the authenticated attacker to gain administrator role privileges.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:JAVA-EXPRESS-HTML-INJ1 - HTTP: Sun Java System Communications Express HTML Injection1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in the Sun Java System Communications Express. Attackers can create malicious Web pages containing dangerous web script or HTML, which if accessed by a victim, can allow the attacker to gain control of the victim's client browser.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:VMWARE-VSPHERE-DOS1 - HTTP: Vmware Vsphere Host Daemon Denial Of Service1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Vmware Vsphere host daemon. A successful attack can result in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:AVIRA-SECURE-BCKUP-REG-BO1 - HTTP: Avira Secure Backup Registry Value Parsing Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Avira Secure Backup. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:PROXY:SQUID-ESI-BO - HTTP: Squid Proxy ESI Component Stack Buffer Overflow

Severity: HIGH

Description:

A stack-based buffer overflow vulnerability has been reported in the Edge Side Includes (ESI) component of the Squid proxy. Successful exploitation allows the attacker to execute arbitrary code on the target under context of the service.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2016-4054

Affected Products:

  • Squid-cache squid 3.4.3
  • Squid-cache squid 3.1.22
  • Squid-cache squid 3.2.0.5
  • Squid-cache squid 3.3.1
  • Squid-cache squid 3.2.0.15
  • Squid-cache squid 3.2.0.3
  • Squid-cache squid 4.0.6
  • Squid-cache squid 3.1.0.10
  • Squid-cache squid 3.1.12.2
  • Squid-cache squid 3.3.2
  • Canonical ubuntu_linux 12.04
  • Squid-cache squid 3.2.0.1
  • Squid-cache squid 3.1.19
  • Squid-cache squid 4.0.4
  • Squid-cache squid 3.4.14
  • Squid-cache squid 3.4.9
  • Squid-cache squid 3.1.0.15
  • Squid-cache squid 3.4.12
  • Squid-cache squid 4.0.2
  • Squid-cache squid 3.4.10
  • Squid-cache squid 3.2.0.13
  • Squid-cache squid 3.1.0.7
  • Squid-cache squid 3.3.9
  • Squid-cache squid 3.2.12
  • Squid-cache squid 3.1.0.17
  • Squid-cache squid 3.1.0.1
  • Squid-cache squid 3.1.2
  • Squid-cache squid 3.5.8
  • Squid-cache squid 3.2.0.9
  • Squid-cache squid 3.1.3
  • Squid-cache squid 3.2.0.17
  • Squid-cache squid 3.2.3
  • Squid-cache squid 3.1.0.16
  • Squid-cache squid 3.2.1
  • Squid-cache squid 4.0.8
  • Squid-cache squid 3.2.7
  • Squid-cache squid 3.1.0.9
  • Canonical ubuntu_linux 14.04
  • Squid-cache squid 3.4.0.3
  • Squid-cache squid 3.2.5
  • Squid-cache squid 3.5.2
  • Squid-cache squid 3.5.11
  • Squid-cache squid 3.5.4
  • Squid-cache squid 3.2.9
  • Squid-cache squid 3.5.13
  • Squid-cache squid 3.4.4.1
  • Squid-cache squid 3.5.6
  • Squid-cache squid 3.5.15
  • Squid-cache squid 3.1.5
  • Squid-cache squid 3.5.0.2
  • Squid-cache squid 3.2.0.19
  • Squid-cache squid 3.4.4
  • Squid-cache squid 3.5.0.4
  • Squid-cache squid 3.2.11
  • Squid-cache squid 3.3.14
  • Squid-cache squid 3.4.8
  • Squid-cache squid 3.1.16
  • Squid-cache squid 3.3.6
  • Squid-cache squid 3.3.12
  • Squid-cache squid 3.2.0.18
  • Squid-cache squid 3.2.0.6
  • Squid-cache squid 3.1.10
  • Squid-cache squid 3.1.0.12
  • Squid-cache squid 3.1.14
  • Squid-cache squid 3.3.10
  • Squid-cache squid 3.4.2
  • Squid-cache squid 3.1.21
  • Squid-cache squid 3.2.0.4
  • Squid-cache squid 3.1.12
  • Squid-cache squid 3.1.0.14
  • Squid-cache squid 3.2.0.14
  • Squid-cache squid 3.2.0.2
  • Squid-cache squid 3.2.0.11
  • Squid-cache squid 3.2.10
  • Squid-cache squid 4.0.7
  • Squid-cache squid 3.3.0
  • Squid-cache squid 3.4.0.1
  • Squid-cache squid 3.2.0.16
  • Squid-cache squid 3.4.11
  • Squid-cache squid 4.0.5
  • Squid-cache squid 3.1.0.18
  • Squid-cache squid 3.1.9
  • Squid-cache squid 3.2.0.10
  • Squid-cache squid 3.1.0.5
  • Squid-cache squid 4.0.3
  • Squid-cache squid 3.1.12.1
  • Squid-cache squid 3.1
  • Squid-cache squid 3.2.0.12
  • Squid-cache squid 4.0.1
  • Squid-cache squid 3.1.17
  • Squid-cache squid 3.0
  • Canonical ubuntu_linux 16.04
  • Canonical ubuntu_linux 15.10
  • Squid-cache squid 3.1.6
  • Squid-cache squid 3.3.8
  • Squid-cache squid 3.3.7
  • Squid-cache squid 3.1.0.8
  • Squid-cache squid 3.5.9
  • Squid-cache squid 3.2.0.8
  • Squid-cache squid 3.1.0.4
  • Squid-cache squid 3.1.4
  • Squid-cache squid 3.1.0.3
  • Squid-cache squid 3.2.2
  • Squid-cache squid 3.1.0.2
  • Squid-cache squid 3.2.13
  • Oracle linux 6.0
  • Squid-cache squid 3.2.6
  • Squid-cache squid 3.1.5.1
  • Squid-cache squid 3.1.7
  • Squid-cache squid 3.1.12.3
  • Squid-cache squid 3.5.1
  • Squid-cache squid 3.2.4
  • Squid-cache squid 3.1.8
  • Squid-cache squid 3.3.0.3
  • Squid-cache squid 3.5.3
  • Squid-cache squid 3.4.13
  • Squid-cache squid 3.1.0.13
  • Squid-cache squid 3.5.5
  • Squid-cache squid 3.2.8
  • Squid-cache squid 3.5.10
  • Squid-cache squid 3.1.0.6
  • Squid-cache squid 3.5.0.1
  • Squid-cache squid 3.5.7
  • Squid-cache squid 3.5.12
  • Squid-cache squid 3.4.4.2
  • Squid-cache squid 3.4.1
  • Squid-cache squid 3.5.0.3
  • Squid-cache squid 3.5.14
  • Oracle linux 7.0
  • Squid-cache squid 3.3.4
  • Squid-cache squid 3.1.18
  • Squid-cache squid 3.1.15
  • Squid-cache squid 3.5.16
  • Squid-cache squid 3.1.1
  • Squid-cache squid 3.4.0.2
  • Squid-cache squid 3.1.0.11
  • Squid-cache squid 3.3.13
  • Squid-cache squid 3.3.0.1
  • Squid-cache squid 3.1.11
  • Squid-cache squid 3.3.5
  • Squid-cache squid 3.3.11
  • Squid-cache squid 3.3.0.2
  • Squid-cache squid 3.1.20
  • Squid-cache squid 3.2.0.7
  • Squid-cache squid 3.1.13
  • Squid-cache squid 3.3.3

HTTP:STC:DL:XLS-SERIES7 - HTTP: Microsoft Excel Malformed Series Record Remote Code Execution7

Severity: HIGH

Description:

This signature detects attempts to exploit a known issue with Microsoft Excel. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:IE:DESIGNMODE-INFO1 - HTTP: Microsoft Internet Explorer DesignMode Information Disclosure1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. Attackers can create malicious Web Sites containing hostile Web pages, which if accessed by users, allows the attacker to gather the victim's personal and business information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:TOMCAT:SERVLET-DEVICE-DOS1 - HTTP: Apache Tomcat Device Servlet Request DoS1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulernability against Apache Group Tomcat Server. Attackers can request a device name from the /examples/servlet directory to render the server inaccessible. This signature also detects attempts to run neuter.c and similar exploits.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


APP:REAL:RAM-FILE-OF - APP: RealMedia RAM File Processing Buffer Overflow

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in RealNetworks RealPlayer products. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • bugtraq: 13264
  • url: http://pb.specialised.info/all/adv/real-ram-adv.txt
  • url: http://service.real.com/help/faq/security/050419_player/EN/
  • cve: CVE-2005-0755
  • cve: CVE-2004-0550
  • cve: CVE-2004-0258

Affected Products:

  • Real_networks realone_player 6.0.11 .830
  • Real_networks realone_player 6.0.11 .853
  • Real_networks realone_player_for_osx 9.0.0 .297
  • Real_networks realone_player_for_osx 9.0.0 .288
  • Red_hat enterprise_linux_es 3
  • Red_hat enterprise_linux_ws 3
  • Real_networks realplayer 8.0.0 Unix
  • Real_networks realone_player 1.0.0
  • Real_networks realone_player 6.0.11 .868
  • Real_networks realplayer 10.0.0
  • Red_hat enterprise_linux_as 3
  • Real_networks realplayer 8.0.0 Mac
  • Real_networks realplayer_10_for_mac_os 10.0.0.305
  • Red_hat desktop 3.0.0
  • Real_networks realplayer 10.5.0 V6.0.12.1056
  • Real_networks realplayer_10_for_mac_os 10.0.0.325
  • Real_networks realplayer 10.5.0 V6.0.12.1053
  • Real_networks realplayer 10.5.0 V6.0.12.1040
  • Real_networks realplayer_10_for_mac_os
  • Real_networks realplayer_10_for_linux
  • Real_networks helix_player_for_linux 1.0.0
  • Real_networks realplayer_enterprise 1.7.0
  • Real_networks realplayer_enterprise 1.1.0
  • Real_networks realplayer_enterprise 1.2.0
  • Real_networks realplayer_enterprise 1.5.0
  • Real_networks realplayer_enterprise 1.6.0
  • Real_networks realplayer_enterprise
  • Real_networks realone_player 6.0.11 .840
  • Real_networks realplayer_for_unix 10.0.3
  • Real_networks helix_player_for_linux 1.0.3
  • Real_networks helix_player_for_linux 1.0.2
  • Real_networks helix_player_for_linux 1.0.1
  • Real_networks realone_player 6.0.11 .872
  • Real_networks realplayer 8.0.0 Win32
  • Real_networks realone_player 6.0.11 .818

HTTP:KASPERSKY-URI-PARSING-DOS3 - HTTP: Kaspersky Products URI Parsing Denial of Service3

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Kaspersky Products. A successful attack can result in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:CA-XOSOFT-XOSOAP - HTTP: Computer Associates XOsoft xosoapapi.asmx Buffer Overflow

Severity: HIGH

Description:

This signature detects attempts to exploit a known buffer overflow vulnerability in CA XOsoft Multiple Products. It is due to insufficient boundary checking when handling certain HTTP requests sent to the ws_man.exe process. A remote unauthenticated attacker can exploit this by sending a malicious HTTP request to a target server. In a successful attack, where arbitrary code is injected and executed on the vulnerable target host, the behavior of the target system is dependent on the malicious code. Note that any code executed by the attacker runs with the privileges of the service. In an unsuccessful attack, the application can terminate abnormally.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 39238
  • cve: CVE-2010-1223

Affected Products:

  • Computer_associates xosoft_content_distribution r12
  • Computer_associates xosoft_content_distribution r12.5
  • Computer_associates xosoft_high_availability r12.5
  • Computer_associates xosoft_replication r12.5
  • Computer_associates xosoft_replication r12
  • Computer_associates xosoft_high_availability r12

APP:CUPS:HPGL-PC-OF - APP: CUPS HPGL Filter Overflow

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the Common Unix Printing System (CUPS) HP Graphic Language (HPGL) Filter. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server, usually the line printer daemon.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • bugtraq: 31688
  • url: http://en.wikipedia.org/wiki/Common_Unix_Printing_System
  • cve: CVE-2008-3641

Affected Products:

  • Avaya proactive_contact 4.0
  • Apple mac_os_x 10.5.1
  • Apple mac_os_x_server 10.5.1
  • Apple mac_os_x 10.4.7
  • Apple mac_os_x_server 10.4.7
  • Avaya messaging_storage_server 1.0
  • Avaya messaging_storage_server 2.0
  • Avaya messaging_storage_server
  • Avaya message_networking
  • Sun opensolaris Build Snv 99
  • Easy_software_products cups 1.1.14
  • Easy_software_products cups 1.1.17
  • Ubuntu ubuntu_linux 6.06 LTS Powerpc
  • Ubuntu ubuntu_linux 6.06 LTS I386
  • Ubuntu ubuntu_linux 6.06 LTS Amd64
  • Easy_software_products cups 1.2.8
  • Easy_software_products cups 1.3.2
  • Suse novell_linux_pos 9
  • Sun opensolaris Build Snv 101A
  • Easy_software_products cups 1.1.19
  • Sun opensolaris Build Snv 91
  • Debian linux 4.0 Arm
  • Ubuntu ubuntu_linux 8.04 LTS Amd64
  • Ubuntu ubuntu_linux 8.04 LTS I386
  • Ubuntu ubuntu_linux 8.04 LTS Lpia
  • Ubuntu ubuntu_linux 8.04 LTS Powerpc
  • Ubuntu ubuntu_linux 8.04 LTS Sparc
  • Red_hat desktop 3.0.0
  • Ubuntu ubuntu_linux 7.10 Lpia
  • Easy_software_products cups 1.1.22
  • Easy_software_products cups 1.1.23
  • Gentoo linux
  • Turbolinux turbolinux_server 10.0.0 X64
  • Suse opensuse 10.3
  • Apple mac_os_x 10.5
  • Easy_software_products cups 1.3.3
  • Red_hat desktop 4.0.0
  • Easy_software_products cups 1.1.12
  • Suse suse_linux_enterprise_server 8
  • Red_hat enterprise_linux_desktop 5 Client
  • Turbolinux wizpy
  • Turbolinux turbolinux_server 11 X64
  • Easy_software_products cups 1.1.18
  • Mandriva corporate_server 4.0.0 X86 64
  • Rpath appliance_platform_linux_service 1
  • Easy_software_products cups 1.2.2
  • Slackware linux 12.1
  • Apple mac_os_x 10.4.1
  • Apple mac_os_x_server 10.4.1
  • Suse open-enterprise-server
  • Easy_software_products cups 1.3.6
  • Suse opensuse 11.0
  • Sun opensolaris Build Snv 92
  • Easy_software_products cups 1.1.13
  • Turbolinux multimedia
  • Turbolinux personal
  • Easy_software_products cups 1.1.16
  • Easy_software_products cups 1.2.4
  • Easy_software_products cups 1.1.23 Rc1
  • Mandriva linux_mandrake 2008.0
  • Mandriva linux_mandrake 2008.0 X86 64
  • Sun opensolaris Build Snv 90
  • Turbolinux appliance_server 2.0
  • Turbolinux appliance_server 3.0
  • Turbolinux appliance_server 3.0 X64
  • Apple mac_os_x 10.4.6
  • Apple mac_os_x_server 10.4.6
  • Ubuntu ubuntu_linux 7.10 I386
  • Turbolinux appliance_server_hosting_edition 1.0.0
  • Turbolinux appliance_server_workgroup_edition 1.0.0
  • Debian linux 4.0 Amd64
  • Easy_software_products cups 1.1.10
  • Easy_software_products cups 1.1.7
  • Avaya intuity_audix_lx 2.0
  • Apple mac_os_x 10.4.4
  • Apple mac_os_x_server 10.4.4
  • Apple mac_os_x 10.4.5
  • Easy_software_products cups 1.1.6
  • Easy_software_products cups 1.0.4 -8
  • Easy_software_products cups 1.1.22 Rc1
  • Apple mac_os_x_server 10.4.5
  • Mandriva linux_mandrake 2008.1
  • Apple mac_os_x 10.4.10
  • Apple mac_os_x_server 10.4.10
  • Pardus linux_2008
  • Easy_software_products cups 1.1.1
  • Debian linux 4.0 M68k
  • Ubuntu ubuntu_linux 7.10 Powerpc
  • Easy_software_products cups 1.1.4
  • Easy_software_products cups 1.1.15
  • Sun opensolaris Build Snv 101
  • Sun opensolaris Build Snv 100
  • Easy_software_products cups 1.1.20
  • Apple mac_os_x 10.4.3
  • Avaya messaging_storage_server 3.1
  • Avaya message_networking 3.1
  • Apple mac_os_x 10.4.9
  • Ubuntu ubuntu_linux 7.10 Sparc
  • Red_hat enterprise_linux_as 3
  • Red_hat enterprise_linux_es 3
  • Red_hat enterprise_linux_ws 3
  • Rpath rpath_linux 1
  • Easy_software_products cups 1.2.10
  • Easy_software_products cups 1.2.9
  • Sun opensolaris Build Snv 93
  • Sun opensolaris Build Snv 94
  • Mandriva linux_mandrake 2009.0
  • Mandriva linux_mandrake 2009.0 X86 64
  • Mandriva corporate_server 4.0
  • Sun opensolaris Build Snv 88
  • Apple mac_os_x_server 10.4.8
  • Mandriva linux_mandrake 2008.1 X86 64
  • Sun opensolaris Build Snv 89
  • Mandriva corporate_server 3.0.0
  • Red_hat enterprise_linux 5 Server
  • Sun opensolaris Build Snv 95
  • Apple mac_os_x_server 10.5
  • Ubuntu ubuntu_linux 7.04 Amd64
  • Sun opensolaris Build Snv 87
  • Ubuntu ubuntu_linux 7.04 Powerpc
  • Ubuntu ubuntu_linux 7.04 Sparc
  • Suse novell_linux_desktop 9.0.0
  • Red_hat enterprise_linux_desktop_workstation 5 Client
  • Red_hat fedora 8
  • Rpath rpath_linux 2
  • Easy_software_products cups 1.3.7
  • Suse opensuse 10.2
  • Easy_software_products cups 1.2.12
  • Apple mac_os_x 10.4.0
  • Apple mac_os_x_server 10.4.0
  • Turbolinux turbolinux_server 11
  • Sun opensolaris Build Snv 96
  • Easy_software_products cups 1.1.21
  • Turbolinux client 2008
  • Ubuntu ubuntu_linux 7.10 Amd64
  • Debian linux 4.0 Alpha
  • Easy_software_products cups 1.1.4 -5
  • Easy_software_products cups 1.1.4 -3
  • Debian linux 4.0 Hppa
  • Debian linux 4.0 Ia-32
  • Debian linux 4.0 Ia-64
  • Turbolinux appliance_server 1.0.0 Workgroup Edition
  • Debian linux 4.0 Mips
  • Debian linux 4.0 Mipsel
  • Debian linux 4.0 Powerpc
  • Debian linux 4.0 S/390
  • Debian linux 4.0 Sparc
  • Debian linux 4.0
  • Mandriva linux_mandrake 2007.1 X86 64
  • Apple mac_os_x 10.4.8
  • Easy_software_products cups 1.3.5
  • Suse suse_linux_enterprise_desktop 10 SP2
  • Apple mac_os_x 10.4.11
  • Avaya messaging_storage_server MM3.0
  • Suse suse_linux_enterprise_server 10 SP2
  • Suse suse_linux_enterprise_server 9
  • Apple mac_os_x_server 10.4.3
  • Apple mac_os_x 10.5.4
  • Avaya voice_portal 3.0
  • Red_hat enterprise_linux_as 4
  • Apple mac_os_x_server 10.5.4
  • Red_hat enterprise_linux_ws 4
  • Apple mac_os_x 10.4.2
  • Apple mac_os_x_server 10.4.2
  • Avaya message_networking MN 3.1
  • Easy_software_products cups 1.1.4 -2
  • Easy_software_products cups 1.0.4
  • Mandriva linux_mandrake 2007.1
  • Ubuntu ubuntu_linux 7.04 I386
  • Turbolinux appliance_server 1.0.0 Hosting Edition
  • Sun opensolaris Build Snv 102
  • Apple mac_os_x 10.5.5
  • Apple mac_os_x_server 10.5.5
  • Ubuntu ubuntu_linux 6.06 LTS Sparc
  • Turbolinux turbolinux_server 10.0.0
  • Suse suse_linux_enterprise_desktop 10 SP1
  • Suse suse_linux_enterprise_server 10 SP1
  • Mandriva corporate_server 3.0.0 X86 64
  • Apple mac_os_x_server 10.4.9
  • Avaya messaging_storage_server 4.0
  • Avaya proactive_contact
  • Apple mac_os_x_server 10.5.2
  • Red_hat enterprise_linux_es 4
  • Apple mac_os_x 10.5.3
  • Turbolinux fuji
  • Rpath appliance_platform_linux_service 2
  • Apple mac_os_x 10.5.2
  • Apple mac_os_x_server 10.5.3
  • Easy_software_products cups 1.1.19 Rc5
  • Apple mac_os_x_server 10.4.11
  • Red_hat fedora 9
  • Suse opensuse 11.1
  • Avaya proactive_contact 3.0

HTTP:STC:IE:CSRSS-HE-MSG - HTTP: Microsoft Windows CSRSS HardError Message Box Vulnerability

Severity: HIGH

Description:

This signature detects attempts to exploit a known memory corruption vulnerability in Microsoft Windows. It due to improper handling of "HardError" messages in Windows Client/Server Runtime Server Subsystem (CSRSS). A remote unauthenticated attacker can exploit this by enticing the target user to visit a malicious Web site using Internet Explorer. A successful attack allows the remote attackers to execute arbitrary code with the privileges of the System. The behavior of the target is entirely dependent on the intended function of the injected code. An unsuccessful attack results in a kernel error condition, which is also known as the "Blue Screen of Death." The vulnerable system can reboot or halt, which results in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 21688
  • cve: CVE-2006-6696

Affected Products:

  • Microsoft windows_xp_professional
  • Microsoft windows_xp_home
  • Microsoft windows_xp_embedded
  • Microsoft windows_xp_embedded SP1
  • Nortel_networks centrex_ip_client_manager 7.0.0
  • Nortel_networks centrex_ip_client_manager 8.0.0
  • Avaya enterprise_management
  • Avaya interaction_center
  • Microsoft windows_vista_x64_edition
  • Avaya integrated_management
  • Microsoft windows_xp_professional_x64_edition SP2
  • Microsoft windows_server_2003_itanium
  • Microsoft windows_server_2003_itanium SP1
  • Microsoft windows_server_2003_itanium SP2
  • Microsoft windows_server_2003_datacenter_x64_edition SP2
  • Microsoft windows_server_2003_enterprise_x64_edition SP2
  • Microsoft windows_server_2003_standard_edition SP2
  • Microsoft windows_xp_tablet_pc_edition SP1
  • Hp storage_management_appliance 2.1
  • Microsoft windows_server_2003_web_edition SP2
  • Avaya agent_access
  • Avaya cms_supervisor
  • Avaya computer_telephony
  • Microsoft windows_2000_professional
  • Avaya messaging_application_server
  • Avaya basic_call_management_system_reporting_desktop
  • Avaya basic_call_management_system_reporting_desktop server
  • Microsoft windows_2000_server SP1
  • Microsoft windows_2000_professional SP1
  • Avaya interaction_center-voice_quick_start
  • Avaya ip_agent
  • Avaya ip_softphone
  • Avaya octelaccess(r)_server
  • Avaya octeldesignertm
  • Avaya operational_analyst
  • Avaya outbound_contact_management
  • Avaya speech_access
  • Avaya unified_messenger_(r)
  • Avaya visual_messenger_tm
  • Avaya visual_vector_client
  • Avaya vpnmanagertm_console
  • Avaya web_messenger
  • Microsoft windows_xp_64-bit_edition_version_2003
  • Microsoft windows_xp_media_center_edition
  • Microsoft windows_xp_tablet_pc_edition
  • Microsoft windows_xp_64-bit_edition
  • Microsoft windows_xp_home SP1
  • Microsoft windows_xp_professional SP1
  • Microsoft windows_server_2003_datacenter_edition SP1
  • Microsoft windows_server_2003_datacenter_edition_itanium SP1
  • Microsoft windows_server_2003_enterprise_edition_itanium SP1
  • Microsoft windows_server_2003_enterprise_edition SP1
  • Microsoft windows_server_2003_standard_edition SP1
  • Microsoft windows_server_2003_web_edition SP1
  • Microsoft windows_2000_datacenter_server SP4
  • Microsoft windows_server_2003_enterprise_edition
  • Microsoft windows_server_2003_datacenter_edition
  • Microsoft windows_server_2003_web_edition
  • Microsoft windows_server_2003_enterprise_edition_itanium
  • Microsoft windows_server_2003_datacenter_edition_itanium
  • Microsoft windows_xp_64-bit_edition_version_2003 SP1
  • Microsoft windows_2000_professional SP3
  • Microsoft windows_2000_server SP3
  • Microsoft windows_2000_advanced_server SP3
  • Microsoft windows_2000_datacenter_server SP3
  • Microsoft windows_xp_64-bit_edition SP1
  • Microsoft windows_2000_datacenter_server SP1
  • Microsoft windows_xp_tablet_pc_edition SP2
  • Microsoft windows_2000_server
  • Microsoft windows_2000_advanced_server
  • Microsoft windows_2000_advanced_server SP4
  • Avaya network_reporting
  • Microsoft windows_2000_professional SP4
  • Microsoft windows_2000_server SP4
  • Avaya unified_communication_center
  • Avaya modular_messaging_(mas)
  • Microsoft windows_server_2003_datacenter_edition SP1 Beta 1
  • Microsoft windows_server_2003_datacenter_edition_itanium SP1 Beta 1
  • Microsoft windows_server_2003_enterprise_edition_itanium SP1 Beta 1
  • Microsoft windows_server_2003_enterprise_edition SP1 Beta 1
  • Microsoft windows_server_2003_standard_edition SP1 Beta 1
  • Microsoft windows_server_2003_web_edition SP1 Beta 1
  • Avaya customer_interaction_express_(cie)_server 1.0
  • Avaya customer_interaction_express_(cie)_user_interface 1.0
  • Avaya messaging_application_server MM 2.0
  • Microsoft windows_xp_gold
  • Nortel_networks centrex_ip_client_manager 9.0
  • Microsoft windows_xp_home SP2
  • Microsoft windows_xp_professional SP2
  • Microsoft windows_xp_media_center_edition SP1
  • Microsoft windows_xp_media_center_edition SP2
  • Microsoft windows_2000_datacenter_server
  • Avaya cvlan
  • Avaya contact_center_express
  • Microsoft windows_vista Ultimate
  • Microsoft windows_vista Home Premium
  • Microsoft windows_vista Home Basic
  • Microsoft windows_vista Business
  • Microsoft windows_vista Enterprise
  • Microsoft windows_server_2003_standard_edition
  • Avaya messaging_application_server MM 3.0
  • Microsoft windows_2000_advanced_server SP1
  • Avaya messaging_application_server MM 3.1
  • Microsoft windows_server_2003_standard_x64_edition
  • Microsoft windows_server_2003_enterprise_x64_edition
  • Microsoft windows_server_2003_datacenter_x64_edition
  • Microsoft windows_xp_professional_x64_edition
  • Microsoft windows_vista
  • Microsoft windows_2000_advanced_server SP2
  • Microsoft windows_2000_datacenter_server SP2
  • Microsoft windows_2000_professional SP2
  • Microsoft windows_2000_server SP2
  • Microsoft windows_xp

HTTP:SQL:INJ:JOOMLA-COM-JCE1 - HTTP: Joomla JCE Component Itemid Parameter SQL Injection1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in Joomla's JCE component. It is due to insufficient validation of Itemid parameter of the index.php script. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


APP:HP-DATA-PROTECTOR-GET-SQL - APP: HP Data Protector Multiple Products GetPolicies SQL Injection

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in HP Data Protector Notebook Extension and HP Data Protector for Personal Computers. It is due to insufficient validation of user-supplied input. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • url: https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03058866&ac.admitted=1321285525395.876444892.492883150
  • cve: CVE-2011-3157

Affected Products:

  • Hp data_protector_for_personal_computers 7.0
  • Hp data_protector_notebook_extension 6.20

APP:HP-DATA-PROTECTOR-REQ-SQL - APP: HP Data Protector Multiple Products RequestCopy SQL Injection

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in HP Data Protector Notebook Extension and HP Data Protector for Personal Computers. It is due to insufficient validation of user-supplied input. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • url: https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03058866&ac.admitted=1322233177040.876444892.492883150
  • cve: CVE-2011-3158

Affected Products:

  • Hp data_protector_for_personal_computers 7.0
  • Hp data_protector_notebook_extension 6.20

HTTP:STC:IE:CVE-2015-6052-RCE - HTTP: Microsoft Internet Explorer CVE-2015-6052 Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2015-6052

Affected Products:

  • Microsoft jscript 5.8
  • Microsoft jscript 5.7
  • Microsoft internet_explorer 11
  • Microsoft vbscript 5.8
  • Microsoft vbscript 5.7
  • Microsoft internet_explorer 10
  • Microsoft internet_explorer 9
  • Microsoft internet_explorer 8

APP:HP-DATA-PROTECTOR-FIN-SQL - APP: HP Data Protector Multiple Products FinishedCopy SQL Injection

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in HP Data Protector Notebook Extension and HP Data Protector for Personal Computers. It is due to insufficient validation of user-supplied input. An attacker can exploit this issue by manipulating the SQL query logic to carry out unauthorized actions on the underlying database.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • url: https://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03058866&ac.admitted=1321285525395.876444892.492883150
  • cve: CVE-2011-3162

Affected Products:

  • Hp data_protector_for_personal_computers 7.0
  • Hp data_protector_notebook_extension 6.20

HTTP:STC:SWF:SWAVE-TSAC-CHUNK - HTTP: Adobe Shockwave tSAC Chunk Invalid Seek Memory Corruption

Severity: HIGH

Description:

This signature detects attempts to exploit a known code execution vulnerability in Adobe Shockwave. It is due to a signedness error while parsing tSAC chunks in Adobe Director fields. The vulnerable code does not properly validate an offset value provided in the chunk data before using it to calculate a memory address. Remote attackers can exploit this by enticing target users to open a malicious DIR file using a vulnerable version of the product. A successful attack can result in arbitrary code execution in the security context of the logged in user. In an unsuccessful attack, the affected application can terminate abnormally.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • bugtraq: 42668
  • cve: CVE-2010-2875

Affected Products:

  • Adobe shockwave_player 11.5.0.601
  • Adobe shockwave_player 11.5.0.596
  • Adobe shockwave_player 11.5.0.600
  • Adobe shockwave_player 11.5.2.606
  • Adobe shockwave_player 11.5.6.606
  • Adobe shockwave_player 11.5.7.609
  • Adobe shockwave_player 11.5.1.601
  • Adobe shockwave_player 11.5.2.602

APP:NOVELL:IMANAGER-ARB-UPLOAD - APP: Novell iManager getMultiPartParameters Arbitrary File Upload

Severity: CRITICAL

Description:

This signature detects attempts to exploit a known flaw in Novell's iManager 2.7 that allows an arbitrary file to be uploaded to the server via iManager/Tomcat. A successful attack could result in arbitrary code execution, data corruption, or a denial of service.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • url: http://www.novell.com/support/viewContent.do?externalId=7006515&sliceId=2

HTTP:STC:DL:PPT-FF-BOF1 - HTTP: PowerPoint File Multiples Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in the Microsoft PowerPoint file format. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the client.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:ASF-DF1 - HTTP: ASF Header Parsing Invalid Free1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Windows Media ASF file format. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:XSS:REDHAT-JBOSS-XSS - HTTP: Red Hat JBoss BPM Suite BRMS Tasks List Cross-Site Scripting

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Red Hat JBoss BPM Suite and JBoss BRMS. Successful exploitation would result in the execution of arbitrary script code in the target user's browser.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • cve: CVE-2017-2674

APP:CITRIX:XENAPP-XML-RCE - APP: Citrix XenApp and XenDesktop XML Service Interface Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in Citrix XenApp and XenDesktop XML Service. A successful attack can lead to a stack overflow and arbitrary remote code execution within the context of the affected application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 48898

Affected Products:

  • Citrix xenapp 4.5
  • Citrix xenapp 4.5 Feature Pack 1
  • Citrix xenapp 5.0
  • Citrix xenapp 6.0
  • Citrix xenapp_fundamentals 3.0
  • Citrix xenapp_fundamentals 6.0
  • Citrix xendesktop 4
  • Citrix xenapp_fundamentals 2.0

HTTP:STC:ADOBE:READER-PLUGIN1 - HTTP: Adobe Acrobat Reader plug-in AcroPDF.dll Resource Consumption1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Acrobat Reader 7.0 through 7.0.8. A successful attack can result in a denial-of-service condition or possible arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:STC:CLSID:ACTIVEX:NESSCAN1 - HTTP: Nessus Vulnerability Scanner 3.0.6 ActiveX Vulnerability1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against the Nessus Vulnerability Scanner. An attacker can create malicious Web pages, which if visited by a victim, can lead to the attacker gaining control of the victim's client browser.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:APPLE-QT-FLIC-BO1 - HTTP: Apple QuickTime FLIC Animation File Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in QuickTime FLIC Animation File handling function. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


APP:MCAFEE-EPOLICY-XML - APP: McAfee ePolicy Orchestrator XML External Entity Injection

Severity: HIGH

Description:

This signature detects attempts to exploit a known flaw in the McAfee ePolicy Orchestrato. A successful attack may result in data exposure and/or arbitrary command injection.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • bugtraq: 65771
  • cve: CVE-2014-2205

Affected Products:

  • Mcafee epolicy_orchestrator 4.6.7
  • Mcafee epolicy_orchestrator 4.6.3
  • Mcafee epolicy_orchestrator 4.6.6
  • Mcafee epolicy_orchestrator 4.6.2
  • Mcafee epolicy_orchestrator 4.6.5
  • Mcafee epolicy_orchestrator 4.6.1
  • Mcafee epolicy_orchestrator 4.6.4
  • Mcafee epolicy_orchestrator 4.6.0

HTTP:STC:ACTIVEX:MS-AGENT-LIB1 - HTTP: Microsoft Agent Unsafe ActiveX Control1

Severity: MEDIUM

Description:

This signature detects attempts to use unsafe ActiveX control in the Microsoft Agent library. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:PHP:PHPSECUREPAGE-RFI1 - HTTP: phpSecurePages cfgProgDir Parameter Remote File Inclusion1

Severity: HIGH

Description:

This signature detects attempts to exploit a known remote file inclusion vulnerability in phpSecurePages. It is due to insufficient validation of user-supplied input. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in arbitrary code execution and loss of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:IE:MHTML-REDIR1 - HTTP: Internet Explorer MHTML Redirection Information Disclosure1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Internet Explorer. A malicious Web site can exploit a redirection bug in IE, to force a user to view a Web page that was not intentionally requested by that user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:CISCO:VOIP:PORT-INFO-DOS1 - HTTP: Cisco VoIP Phone PortInformation DOS1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in Cisco VoIP phones. Versions CP-7910 and later are vulnerable. Attackers can send an arbitrarily long (120000+) StreamID to the PortInformation script to cause an error message that displays a memory dump. Attackers can use this information to reconstruct the calling patterns of a particular phone.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:IE:MAL-JPEG1 - HTTP: Microsoft Internet Explorer Malformed JPEG File1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in Internet Explorer. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:PHP:YABBSE-PKG-EXEC2 - HTTP: YabbSE Packages.php Code Execution2

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Packages.php in YabbSE. YabbSE 1.5.0 and earlier are vulnerable. Attackers can include remote malicious code in Packages.php that can allow them to execute arbitrary commands with Web server privileges.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:AUDIT:PDF-SCIIHEXDECODE - HTTP: Adobe PDF SCIIHexDecode Evasion Method Detection

Severity: INFO

Description:

This signature detects attempts to bypass security devices using the SCIIHexDecodemethod in a PDF document. Attackers can bypass security devices by using this method.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:EK-ORACLE-JAVA-DWNLD - HTTP: Unknown Exlpoit Downloads Oracle Java Jar file

Severity: HIGH

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:IIS:SHAREPOINT-CONVERT - HTTP: Microsoft Sharepoint Document Conversion Remote Code Execution

Severity: CRITICAL

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Sharepoint. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2010-3964
  • bugtraq: 45264

Affected Products:

  • Microsoft sharepoint_server_2007
  • Microsoft sharepoint_server_2007 SP2
  • Microsoft sharepoint_server_2007_x64 SP2
  • Microsoft sharepoint_server_2007 SP1
  • Microsoft sharepoint_server_2007_x64 SP1
  • Microsoft sharepoint_server_2007_x64

HTTP:STC:IMG:XP-MAL-TIFF - HTTP: Microsoft Office XP Malicious TIFF

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Office XP. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2010-3947
  • bugtraq: 45274

Affected Products:

  • Microsoft office_xp SP3
  • Microsoft office_xp SP1
  • Microsoft office_converter_pack
  • Microsoft office_xp SP2
  • Microsoft office_xp

HTTP:EK-REDKIT-OBFUS-PE - HTTP: Redkit Exploit Kit Obfuscated Portable Executable

Severity: HIGH

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:XLS-RTWINDOW1 - HTTP: Microsoft Excel rtWindow1 Record Handling Code Execution1

Severity: MEDIUM

Description:

A memory corruption vulnerability exists in the way Microsoft Excel handles XLS files that contain invalid values within the rtWindow1 records. A remote attacker can exploit this vulnerability by persuading a target user to open a specially crafted XLS file, potentially causing arbitrary code to be injected and executed in the security context of the logged in user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, Excel will terminate resulting in the loss of any unsaved data from the current session.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:MISC:NETCHARTS-SER-RCE - HTTP: Visual Mining NetCharts Server Path Traversal File Upload Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Visual Mining NetCharts Server. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 114127
  • cve: CVE-2014-8516

HTTP:STC:SCRIPT:DOUBLE-BACKSLA1 - HTTP: JavaScript Double BackSlash Hex Obfuscated Heap Spray1

Severity: HIGH

Description:

This signature detects attempts to trigger an exploit that leverages a precise Heap Spraying technique referred to as "js_property_spray". Such exploits are part of an attack that, if successful, could allow an attacker to execute arbitrary code on the targeted system.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1

References:

  • cve: CVE-2007-5020
  • cve: CVE-2010-1797
  • cve: CVE-2008-2992

Affected Products:

  • Adobe acrobat 8.1 (:windows)
  • Adobe acrobat 8.1
  • Adobe acrobat_reader 8.1
  • Adobe acrobat_reader 8.1 (:windows)

HTTP:XSS:FRONTPAGE-EXT - HTTP: FrontPage Server Extensions XSS

Severity: HIGH

Description:

This signature detects HTTP POST requests to a Microsoft FrontPage Server containing script elements. A successful attack can lead to information disclosure or execution of arbitrary code.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • url: http://msdn.microsoft.com/library/?url=/library/en-us/dnservext02/fpse2002ovrw.asp
  • bugtraq: 17452
  • cve: CVE-2006-0015

Affected Products:

  • Microsoft windows_xp_professional
  • Microsoft windows_server_2003_standard_x64_edition
  • Microsoft windows_server_2003_enterprise_x64_edition
  • Microsoft frontpage_server_extensions_2002
  • Microsoft windows_server_2003_enterprise_edition_itanium
  • Microsoft windows_server_2003_datacenter_edition_itanium
  • Microsoft windows_xp_professional_x64_edition
  • Microsoft windows_xp_professional SP2
  • Microsoft sharepoint_team_services_2002
  • Microsoft windows_server_2003_datacenter_edition_itanium SP1
  • Microsoft windows_server_2003_enterprise_edition_itanium SP1
  • Microsoft windows_server_2003_enterprise_edition SP1
  • Microsoft windows_server_2003_standard_edition SP1
  • Microsoft windows_xp_home SP2

HTTP:STC:DL:ONENOTE-INFO-DISC2 - HTTP: Microsoft Office OneNote 2010 Buffer Size Validation2

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Office OneNote 2010. A successful attack can lead to unauthorized information disclosure.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:DL:MS-PP-PRESENT-RCE1 - HTTP: Microsoft PowerPoint Presentation Handling Remote Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft PowerPoint. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:NGINX-CHUNKED-BO - HTTP: Nginx Parsed Chunked Buffer Overflow

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the Nginx HTTP Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2013-2028

Affected Products:

  • Igor_sysoev nginx 1.4.0
  • Igor_sysoev nginx 1.3.9

HTTP:MISC:HPE-IMC-RCE - HTTP: HPE Intelligent Management Center WebDMServlet Insecure Deserialization

Severity: CRITICAL

Description:

An insecure deserialization vulnerability has been reported in HPE Intelligent Management Center. A remote, unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted serialized object. Successful exploitation results in arbitrary code execution under the context of the SYSTEM or root user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • cve: CVE-2017-12558

HTTP:MISC:RED-HAT-JBOSS-CE - HTTP: Red Hat JBoss Application Server doFilter Insecure Deserialization

Severity: CRITICAL

Description:

An insecure deserialization vulnerability has been reported in Red Hat JBoss Application Server.A remote, unauthenticated attacker can exploit this vulnerability by sending a maliciously crafted serialized object.Successful exploitation can result in arbitrary code execution in the security context of the SYSTEM/root user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1

References:

  • bugtraq: 100591
  • cve: CVE-2017-12149

Affected Products:

  • Redhat jboss_enterprise_application_platform 5.2.2
  • Redhat jboss_enterprise_application_platform 5.1.1
  • Redhat jboss_enterprise_application_platform 5.1.0
  • Redhat jboss_enterprise_application_platform 5.0.0
  • Redhat jboss_enterprise_application_platform 5.2.0
  • Redhat jboss_enterprise_application_platform 5.0.1
  • Redhat jboss_enterprise_application_platform 5.2.1
  • Redhat jboss_enterprise_application_platform 5.1.2

HTTP:STC:SWF:OPENTYPE-FONT-OF1 - HTTP: Adobe Flash Player OpenType Font Parsing Integer Overflow1

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1


HTTP:SAP-MGT-CON-OSEXEC1 - HTTP: SAP Management Console SOAP Interface Code Execution1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against SAP Management Console SOAP Interface. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:EK-NUCLEAR-JAR-DWNLD - HTTP: Nuclear Exploit Kit Jar File Download

Severity: HIGH

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:ADOBE-ROBOHELP-FILE-UPLOA1 - HTTP: Adobe RoboHelp Server Arbitrary File Upload and Execute1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against Adobe RoboHelp. It is due to insufficient validation of POST requests sent to the management web server. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:STC:IE:UNICODE-EVSN-UTF-1 - HTTP: Unicode Evasion Detected 1

Severity: HIGH

Description:

When char-set value set at server is different from what the unicode encoding payload is following. This may allows attackers to bypass security rule intended to restrict malicious traffic.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:EK-NUCLEAR-FLASH-FILE1 - HTTP: Nuclear Exploit Kit Flash File Download 1

Severity: HIGH

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:EK-NECLEAR-OBFU-FILE - HTTP: Nuclear Exploit Kit Obfuscated File Download

Severity: HIGH

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:W3C-AMAYA-BOF1 - HTTP: W3C Amaya Stack Based Buffer Overflow1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability against W3C Amaya. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:DIR:ORACLE-INFO-DISCOVERY - HTTP: Oracle Endeca Information Discovery Integrator ETL Server RenameFile Directory Traversal

Severity: HIGH

Description:

This signature detects attempts to exploit a known flaw in Oracle Endeca Information Discovery Integrator ETL Server.. A successful attack can result in directory traversal attacks.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2015-2606

Affected Products:

  • Oracle fusion_middleware 2.2.2
  • Oracle fusion_middleware 3.0
  • Oracle fusion_middleware 3.1
  • Oracle fusion_middleware 2.4
  • Oracle fusion_middleware 2.3

HTTP:DIR:NOVELL-GROUPWSE-DIRTRA - HTTP: Novell GroupWise Admin Service FileUploadServlet Directory Traversal

Severity: HIGH

Description:

This signature detects directory traversal attempts in Administration Service of Novell GroupWise 2014.A successful attack can lead to gain access to restricted files. This may lead to disclosure of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2014-0600

Affected Products:

  • Novell groupwise 2014

HTTP:GOOGLE-SKETCHUP-BMP-BO1 - HTTP: Google SketchUp BMP File Buffer Overflow (CVE-2013-3664)1

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulnerability in the Trimble Navigation (formerly Google) SketchUp. A successful attack may lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, idp-5.1.110170603, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, isg-3.1.134269, vsrx-15.1


HTTP:EK-MUL-PE-DOWNLOAD - HTTP: Multiple Exploit Kit Portable Executable Download

Severity: HIGH

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


APP:ZLIB-COMPRES-LIB-DOS-2 - APP: Zlib Compression Library Denial Of Service (2)

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Zlib Compression Library. A successful attack can result in a denial-of-service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, mx-11.4, idp-4.1.0, mx-16.1, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, idp-5.1.110170603, j-series-9.5, srx-12.1, srx-branch-12.1, vsrx-12.1, vsrx-15.1

References:

  • bugtraq: 11051
  • cve: CVE-2004-0797

Affected Products:

  • Gnu zlib 1.2.1

HTTP:ORACLE:WEBLOGIC-WLSWSAT-ID - HTTP: Oracle WebLogic Server WorkContextXmlInputAdapter Insecure Deserialization

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in Oracle WebLogic Server. Successful exploitation can result in arbitrary code execution in the context of the user running WebLogic.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 101304
  • cve: CVE-2017-10271

Affected Products:

  • Oracle weblogic_server 12.1.3.0.0
  • Oracle weblogic_server 12.2.1.2.0
  • Oracle weblogic_server 10.3.6.0.0
  • Oracle weblogic_server 12.2.1.1.0

HTTP:EK-ANGLER-RELAY-TRAFFIC - HTTP: Angler Exploit Kit Relay Traffic Detected1

Severity: HIGH

Description:

This signature detects an attempt to download exploits from malicious exploit kits that may compromise a computer through various vendor vulnerabilities. Exploit kits are very specific type of toolkits which are being used by cybercriminals to deliver other pieces of malware.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1


HTTP:APACHE:MOD-DAV-MERGE-DOS - HTTP: Apache HTTP Server mod_dav MERGE Request Denial of Service

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability in the mod_dav component of Apache HTTP Server. It is due to a NULL pointer deference when processing a MERGE request with a URI whose source href points to a non-DAV configured URI. A remote attacker may send a crafted HTTP request to cause a denial of service condition.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2013-1896

Affected Products:

  • Apache http_server 2.2.16
  • Apache http_server 2.2.19
  • Apache http_server 2.2.18
  • Apache http_server 2.2.1
  • Apache http_server 2.2.0
  • Apache http_server 2.2.20
  • Apache http_server 2.2.3
  • Apache http_server 2.2.21
  • Apache http_server 2.2.2
  • Apache http_server 2.2.22
  • Apache http_server 2.2.23
  • Apache http_server 2.2.4
  • Apache http_server 2.2.11
  • Apache http_server 2.2.6
  • Apache http_server 2.2.10
  • Apache http_server 2.2.9
  • Apache http_server 2.2.13
  • Apache http_server 2.2.8
  • Apache http_server 2.2.12
  • Apache http_server 2.2.15
  • Apache http_server up to 2.2.24
  • Apache http_server 2.2.14
  • Apache http_server 2.2.17

HTTP:HPE-ACCESS-DESERIALIZATION - HTTP: HPE Intelligent Management Center accessMgrServlet Insecure Deserialization

Severity: HIGH

Description:

An insecure deserialization vulnerability has been reported in HPE Intelligent Management Center. Successful exploitation results in arbitrary code execution under the context of the SYSTEM or root user.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • cve: CVE-2017-5790

HTTP:ORACLE:EVNTPRO-DIR-TRAV - HTTP:Oracle Event Processing FileUploadServlet Directory Traversal

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known directory traversal vulnerability in Oracle Application Server. It is due to improper handling of user data when processing several request parameter values. A remote attacker can exploit this by sending specially crafted request to the target system. A successful attack can allow disclosure of sensitive information.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, idp-5.0.0, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1

References:

  • bugtraq: 66871
  • url: http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
  • cve: CVE-2014-2424

Affected Products:

  • Oracle fusion_middleware 11.1.1.7.0
Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out