Update #3228 (11/28/2019)
10 new signatures:
MEDIUM | HTTP:CTS:OPEN-EMR-XSS | HTTP: OpenEMR C-Document Cross-Site Scripting |
CRITICAL | HTTP:APACHE:SOLR-DATIMPORT-RCE | HTTP: Apache Solr DataImportHandler Remote Code Execution |
CRITICAL | HTTP:CTS:HPE-BYTE-MSG-RCE | HTTP: HPE Intelligent Management Center ByteMessageResource Insecure Deserialization Remote Code Execution |
HIGH | HTTP2:APACHE-SETTING-DNS | HTTP2: Apache Traffic Server HTTP2 Settings Flood Denial of Service |
MEDIUM | HTTP:SQL:INJ:WIKID-SERVER-SQLI | HTTP: WiKID 2FA Enterprise Server searchDevices.jsp SQL Injection |
CRITICAL | HTTP:CISCO:IOS-XE-CI | HTTP: Cisco IOS XE WebUI Privileged Command Injection |
CRITICAL | HTTP:TOMCAT:CVE-2019-0232-RCE | HTTP: Apache Tomcat CVE-2019-0232 Command Injection |
CRITICAL | HTTP:STC:SCRIPT:UNESCAPE-RCE | HTTP: Java Script Unescape Hex Encoded Remote Code Execution |
MEDIUM | HTTP:CTS:PULSE-SECURE-BO | HTTP: Pulse Secure Platform Stack-Based Buffer Overflow |
HIGH | HTTP:SQL:INJ:ZOHO-ENGN-SQLI | HTTP: Zoho ManageEngine SQL Injection |
4 updated signatures:
HIGH | SMTP:DOS:SMTP-BDAT-DOS | SMTP: Exim BDAT Denial of Service |
HIGH | HTTP:MISC:NG-ARB-FLUPLOAD | HTTP: Netgear ProSAFE NMS300 fileUpload.do Arbitrary File Upload |
HIGH | HTTP:STC:IE:DRAG-N-DRP | HTTP: Internet Explorer Drag And Drop |
LOW | HTTP:STC:IE:IE-ACTIVEX-DRCTANIM | HTTP: Internet Explorer ActiveX DirectAnimation |
Details of the signatures included within this bulletin:
HTTP:CTS:OPEN-EMR-XSS - HTTP: OpenEMR C-Document Cross-Site Scripting
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known cross-site scripting vulnerability against OpenEMR. It is due to insufficient validation of user-supplied input. Attackers can steal cookie-based authentication credentials and launch other attacks.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
Severity: CRITICAL
Description:
This signature detects attempts to exploit a known vulnerability against Apache Solr. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Apache solr 6.0.0
- Apache solr 6.2.1
- Apache solr 4.6.0
- Apache solr 3.6.0
- Apache solr 4.6.1
- Apache solr 3.6.2
- Apache solr 4.5.0
- Apache solr 4.2.0
- Apache solr 7.0.0
- Apache solr 4.8.0
- Apache solr 7.4.0
- Apache solr 7.3.0
- Apache solr 6.6.2
- Apache solr 8.0.0
- Apache solr 1.1.0
- Apache solr 5.4.1
- Apache solr 6.6.4
- Apache solr 7.5.0
- Apache solr 5.0
- Apache solr 7.7.1
- Apache solr 4.3.0
- Apache solr 5.2.1
- Apache solr 1.4.1
- Apache solr 4.9.0
- Apache solr 7.7.0
- Apache solr 7.2.0
- Apache solr 3.2
- Apache solr 6.4.2
- Apache solr 8.1.0
- Apache solr 6.1.0
- Apache solr 6.3.0
- Apache solr 5.1.0
- Apache solr 6.4.1
- Apache solr 5.5.4
- Apache solr 4.10.1
- Apache solr 4.10.3
- Apache solr 5.5.0
- Apache solr 7.1.0
- Apache solr 5.5.2
- Apache solr 5.2.0
- Apache solr 3.6.1
- Apache solr 6.6.1
- Apache solr 5.3.2
- Apache solr 6.2.0
- Apache solr 6.5.0
- Apache solr 4.2.1
- Apache solr 5.3.0
- Apache solr 4.7.1
- Apache solr 7.7.2
- Apache solr 4.5.1
- Apache solr 4.8.1
- Apache solr 7.3.1
- Apache solr 1.2
- Apache solr 6.5.1
- Apache solr 6.6.0
- Apache solr 6.6.3
- Apache solr 7.0.1
- Apache solr 5.4.0
- Apache solr 6.6.5
- Apache solr 6.0.1
- Apache solr 3.5.0
- Apache solr 5.1
- Apache solr 4.0.0
- Apache solr 4.7.2
- Apache solr 7.6.0
- Apache solr 5.3
- Apache solr 4.7.0
- Apache solr 1.4.0
- Apache solr 1.3.0
- Apache solr 4.3.1
- Apache solr 4.9.1
- Apache solr 7.2.1
- Apache solr 5.3.1
- Apache solr 3.3
- Apache solr 4.1.0
- Apache solr 8.1.1
- Apache solr 3.1
- Apache solr 3.4.0
- Apache solr 4.4.0
- Apache solr 5.5.5
- Apache solr 6.4.0
- Apache solr 4.10.0
- Apache solr 5.5.1
- Apache solr 4.10.2
- Apache solr 5.5.3
- Apache solr 4.10.4
HTTP:CTS:HPE-BYTE-MSG-RCE - HTTP: HPE Intelligent Management Center ByteMessageResource Insecure Deserialization Remote Code Execution
Severity: CRITICAL
Description:
This signature detects attempts to exploit a known vulnerability against HPE Intelligent Management Center. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Hp intelligent_management_center 5.2
- Hp intelligent_management_center 7.3
- Hp intelligent_management_center 5.0
- Hp intelligent_management_center 7.0
- Hp intelligent_management_center 5.1
- Hp intelligent_management_center 7.2
HTTP2:APACHE-SETTING-DNS - HTTP2: Apache Traffic Server HTTP2 Settings Flood Denial of Service
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Apache Traffic Server. A successful attack can result in a denial-of-service condition.
Supported On:
srx-branch-19.2, vsrx3bsd-19.2, srx-17.3, vsrx-17.4, srx-branch-17.4, srx-17.4, vsrx-15.1, vsrx3bsd-18.2, srx-18.2, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, srx-branch-19.1, vsrx-19.2, srx-19.2
References:
Affected Products:
- Apple swiftnio 1.2.1
- Apple swiftnio 1.1.1
- Apple swiftnio 1.2.2
- Apache traffic_server 7.1.0
- Apache traffic_server 8.0.0
- Apache traffic_server 6.1.1
- Apple swiftnio 1.4.0
- Apache traffic_server 7.0.0
- Apple swiftnio 1.3.1
- Apache traffic_server 6.1.0
- Apple swiftnio 1.3.0
- Apache traffic_server 6.2.2
- Apache traffic_server 6.2.3
- Apache traffic_server 8.0.2
- Apple swiftnio 1.3.2
- Apache traffic_server 6.2.0
- Apache traffic_server 6.0.0
- Apache traffic_server 8.0.3
- Apache traffic_server 6.2.1
- Apache traffic_server 7.1.1
- Apple swiftnio 1.0.0
- Apache traffic_server 8.0.1
- Apache traffic_server 6.0.3
- Apache traffic_server 7.1.4
- Apache traffic_server 7.1.5
- Apache traffic_server 7.1.6
- Apache traffic_server 7.1.3
- Apple swiftnio 1.1.0
- Apache traffic_server 7.1.2
- Apple swiftnio 1.0.1
- Apple swiftnio 1.2.0
Severity: LOW
Description:
This signature detects Web pages containing dangerous ActiveX object. A malicious Web site can exploit a known vulnerability in Microsoft Internet Explorer and create a denial of service to the client browser.
Supported On:
idp-5.1.110161014, DI-Client, DI-Worm, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Microsoft internet_explorer 6.0
- Microsoft internet_explorer 6.0 SP1
HTTP:SQL:INJ:WIKID-SERVER-SQLI - HTTP: WiKID 2FA Enterprise Server searchDevices.jsp SQL Injection
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against WiKID 2FA Enterprise Server. A successful attack can lead to SQL injection.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Wikidsystems two_factor_authentication_enterprise_server 4.2.0-b2047
HTTP:CISCO:IOS-XE-CI - HTTP: Cisco IOS XE WebUI Privileged Command Injection
Severity: CRITICAL
Description:
This signature detects attempts to exploit a known vulnerability against WebUI component of Cisco IOS XE. A successful attack can lead to command injection and arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Cisco ios_xe 16.6.5
- Cisco ios 16.11.1
- Cisco ios_xe 17.1.1
Severity: CRITICAL
Description:
This signature detects attempts to exploit a known command injection vulnerability in Apache Tomcat. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, isg-3.0.0, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Apache tomcat 8.5.33
- Apache tomcat 8.5.6
- Apache tomcat 8.5.20
- Apache tomcat 8.5.31
- Apache tomcat 7.0.58
- Apache tomcat 7.0.49
- Apache tomcat 8.5.4
- Apache tomcat 8.5.37
- Apache tomcat 8.5.2
- Apache tomcat 8.5.35
- Apache tomcat 8.5.19
- Apache tomcat 8.5.0
- Apache tomcat 7.0.52
- Apache tomcat 7.0.27
- Apache tomcat 7.0.50
- Apache tomcat 7.0.21
- Apache tomcat 7.0.56
- Apache tomcat 9.0.15
- Apache tomcat 8.5.18
- Apache tomcat 7.0.81
- Apache tomcat 7.0.54
- Apache tomcat 9.0.17
- Apache tomcat 7.0.25
- Apache tomcat 7.0.83
- Apache tomcat 7.0.68
- Apache tomcat 9.0.11
- Apache tomcat 9.0.7
- Apache tomcat 8.5.14
- Apache tomcat 7.0.85
- Apache tomcat 7.0.66
- Apache tomcat 7.0.30
- Apache tomcat 9.0.13
- Apache tomcat 9.0.5
- Apache tomcat 8.5.16
- Apache tomcat 8.5.24
- Apache tomcat 7.0.87
- Apache tomcat 7.0.64
- Apache tomcat 7.0.32
- Apache tomcat 9.0.3
- Apache tomcat 8.5.10
- Apache tomcat 8.5.26
- Apache tomcat 7.0.9
- Apache tomcat 7.0.89
- Apache tomcat 7.0.62
- Apache tomcat 7.0.34
- Apache tomcat 9.0.1
- Apache tomcat 8.5.12
- Apache tomcat 7.0.79
- Apache tomcat 7.0.60
- Apache tomcat 7.0.36
- Apache tomcat 7.0.17
- Apache tomcat 8.5.22
- Apache tomcat 7.0.38
- Apache tomcat 7.0.15
- Apache tomcat 7.0.75
- Apache tomcat 7.0.93
- Apache tomcat 7.0.44
- Apache tomcat 7.0.13
- Apache tomcat 7.0.77
- Apache tomcat 8.5.38
- Apache tomcat 7.0.1
- Apache tomcat 7.0.91
- Apache tomcat 7.0.46
- Apache tomcat 9.0.9
- Apache tomcat 8.5.28
- Apache tomcat 7.0.3
- Apache tomcat 7.0.40
- Apache tomcat 7.0.73
- Apache tomcat 7.0.5
- Apache tomcat 7.0.42
- Apache tomcat 8.5.32
- Apache tomcat 7.0.7
- Apache tomcat 8.5.9
- Apache tomcat 9.0.8
- Apache tomcat 8.5.30
- Apache tomcat 8.5.7
- Apache tomcat 8.5.29
- Apache tomcat 8.5.36
- Apache tomcat 7.0.59
- Apache tomcat 7.0.48
- Apache tomcat 8.5.5
- Apache tomcat 8.5.34
- Apache tomcat 8.5.3
- Apache tomcat 7.0.11
- Apache tomcat 8.5.1
- Apache tomcat 7.0.71
- Apache tomcat 7.0.29
- Apache tomcat 7.0.53
- Apache tomcat 7.0.22
- Apache tomcat 7.0.51
- Apache tomcat 9.0.14
- Apache tomcat 7.0.20
- Apache tomcat 7.0.57
- Apache tomcat 9.0.16
- Apache tomcat 7.0.26
- Apache tomcat 7.0.28
- Apache tomcat 7.0.80
- Apache tomcat 7.0.55
- Apache tomcat 7.0.69
- Apache tomcat 9.0.10
- Apache tomcat 9.0.6
- Apache tomcat 7.0.24
- Apache tomcat 7.0.82
- Apache tomcat 7.0.67
- Apache tomcat 9.0.12
- Apache tomcat 9.0.4
- Apache tomcat 8.5.15
- Apache tomcat 8.5.25
- Apache tomcat 7.0.84
- Apache tomcat 7.0.65
- Apache tomcat 7.0.31
- Apache tomcat 9.0.2
- Apache tomcat 8.5.17
- Apache tomcat 8.5.27
- Apache tomcat 7.0.8
- Apache tomcat 7.0.86
- Apache tomcat 7.0.63
- Apache tomcat 7.0.33
- Apache tomcat 7.0.23
- Apache tomcat 7.0.18
- Apache tomcat 8.5.11
- Apache tomcat 7.0.78
- Apache tomcat 8.5.21
- Apache tomcat 7.0.88
- Apache tomcat 7.0.61
- Apache tomcat 7.0.35
- Apache tomcat 7.0.16
- Apache tomcat 8.5.13
- Apache tomcat 8.5.23
- Apache tomcat 7.0.37
- Apache tomcat 9.0.0
- Apache tomcat 7.0.14
- Apache tomcat 7.0.74
- Apache tomcat 7.0.92
- Apache tomcat 7.0.39
- Apache tomcat 7.0.45
- Apache tomcat 7.0.12
- Apache tomcat 7.0.76
- Apache tomcat 7.0.0
- Apache tomcat 7.0.90
- Apache tomcat 7.0.47
- Apache tomcat 7.0.10
- Apache tomcat 7.0.70
- Apache tomcat 8.5.39
- Apache tomcat 7.0.2
- Apache tomcat 7.0.41
- Apache tomcat 7.0.19
- Apache tomcat 7.0.72
- Apache tomcat 7.0.4
- Apache tomcat 7.0.43
- Apache tomcat 7.0.6
- Apache tomcat 8.5.8
Severity: HIGH
Description:
A denial-of-service vulnerability has been reported in the Exim message transfer agent. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request. Successful exploitation could result in denial-of-service conditions.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, isg-3.5.141818, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Exim exim 4.89
- Exim exim 4.88
- Debian debian_linux 9.0
HTTP:MISC:NG-ARB-FLUPLOAD - HTTP: Netgear ProSAFE NMS300 fileUpload.do Arbitrary File Upload
Severity: HIGH
Description:
This signature detects an attempt to exploit a known vulnerability against Netgear ProSAFE. Successful exploitation could allow an attacker to upload arbitrary files which could lead to further attacks.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Netgear prosafe_network_management_software_300 1.5.0.11
HTTP:STC:SCRIPT:UNESCAPE-RCE - HTTP: Java Script Unescape Hex Encoded Remote Code Execution
Severity: CRITICAL
Description:
This signature detects attempts to exploit a known vulnerability against Internet Explorer. A successful attack can lead to arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, srx-17.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Microsoft internet_explorer 11
HTTP:CTS:PULSE-SECURE-BO - HTTP: Pulse Secure Platform Stack-Based Buffer Overflow
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Pulse Secure. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the Pulse Secure Server.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Pulsesecure pulse_policy_secure 5.3r5.0
- Pulsesecure pulse_policy_secure 9.0r2.1
- Pulsesecure pulse_policy_secure 5.3r2.0
- Pulsesecure pulse_policy_secure 5.4r6
- Pulsesecure pulse_policy_secure 5.3r8.1
- Pulsesecure pulse_connect_secure 8.2r1.0
- Pulsesecure pulse_policy_secure 5.3r5.2
- Pulsesecure pulse_connect_secure 9.0r2
- Pulsesecure pulse_policy_secure 5.1r1.1
- Pulsesecure pulse_connect_secure 8.2r9.0
- Pulsesecure pulse_connect_secure 8.1r9.2
- Pulsesecure pulse_connect_secure 8.3r5.2
- Pulsesecure pulse_policy_secure 5.2r3.0
- Pulsesecure pulse_policy_secure 5.2rx
- Pulsesecure pulse_policy_secure 5.1r10.0
- Pulsesecure pulse_policy_secure 5.2r7.0
- Pulsesecure pulse_connect_secure 9.0rx
- Pulsesecure pulse_policy_secure 9.0r2
- Pulsesecure pulse_connect_secure 8.1r3.2
- Pulsesecure pulse_policy_secure 5.3r1.1
- Pulsesecure pulse_policy_secure 5.2r9.0
- Pulsesecure pulse_policy_secure 5.1r2.1
- Pulsesecure pulse_connect_secure 8.2r2.0
- Pulsesecure pulse_policy_secure 5.1r12.0
- Pulsesecure pulse_policy_secure 5.1r1.0
- Pulsesecure pulse_connect_secure 8.1r12.0
- Pulsesecure pulse_policy_secure 5.1r9.0
- Pulsesecure pulse_policy_secure 5.3r9.0
- Pulsesecure pulse_connect_secure 8.1r11.0
- Pulsesecure pulse_policy_secure 5.1r2.0
- Pulsesecure pulse_connect_secure 9.0r2.1
- Pulsesecure pulse_policy_secure 5.3r3.0
- Pulsesecure pulse_connect_secure 8.2r5.0
- Pulsesecure pulse_policy_secure 5.2r8.0
- Pulsesecure pulse_policy_secure 5.2r3.2
- Pulsesecure pulse_policy_secure 5.1r7.0
- Pulsesecure pulse_policy_secure 5.2r6.0
- Pulsesecure pulse_policy_secure 5.3r3.1
- Pulsesecure pulse_connect_secure 8.2r7.1
- Pulsesecure pulse_policy_secure 5.1r11.1
- Pulsesecure pulse_connect_secure 8.3rx
- Pulsesecure pulse_connect_secure 8.1r2.0
- Pulsesecure pulse_policy_secure 5.3r11.0
- Pulsesecure pulse_connect_secure 8.3r6.1
- Pulsesecure pulse_policy_secure 5.2r2.0
- Pulsesecure pulse_connect_secure 8.3r2
- Pulsesecure pulse_policy_secure 5.3r4.1
- Pulsesecure pulse_policy_secure 5.4r7
- Pulsesecure pulse_policy_secure 5.1r5.0
- Pulsesecure pulse_connect_secure 8.3r4
- Pulsesecure pulse_connect_secure 8.1r3.0
- Pulsesecure pulse_connect_secure 8.2r8.1
- Pulsesecure pulse_connect_secure 8.3r6
- Pulsesecure pulse_connect_secure 8.1r1.1
- Pulsesecure pulse_policy_secure 5.2r9.1
- Pulsesecure pulse_connect_secure 9.0r3.2
- Pulsesecure pulse_policy_secure 5.2r5.0
- Pulsesecure pulse_connect_secure 8.2r3.0
- Pulsesecure pulse_policy_secure 5.4r2.1
- Pulsesecure pulse_connect_secure 8.1r9.0
- Pulsesecure pulse_policy_secure 5.4r4
- Pulsesecure pulse_policy_secure 5.2r10.0
- Pulsesecure pulse_policy_secure 5.2r4.0
- Pulsesecure pulse_policy_secure 5.3r7.0
- Pulsesecure pulse_policy_secure 5.1r11.0
- Pulsesecure pulse_connect_secure 8.1r4.0
- Pulsesecure pulse_connect_secure 8.1r5.0
- Pulsesecure pulse_connect_secure 8.1r9.1
- Pulsesecure pulse_policy_secure 5.2r7.1
- Pulsesecure pulse_policy_secure 5.1r14.0
- Pulsesecure pulse_connect_secure 8.2r4.1
- Pulsesecure pulse_connect_secure 8.2r1.1
- Pulsesecure pulse_connect_secure 8.2r12.0
- Pulsesecure pulse_policy_secure 5.3r5.1
- Pulsesecure pulse_connect_secure 9.0r3
- Pulsesecure pulse_policy_secure 5.3r6.0
- Pulsesecure pulse_policy_secure 5.3r8.0
- Pulsesecure pulse_connect_secure 8.2r11.0
- Pulsesecure pulse_connect_secure 9.0r1
- Pulsesecure pulse_connect_secure 8.2r6.0
- Pulsesecure pulse_policy_secure 5.3r8.2
- Pulsesecure pulse_connect_secure 8.1r13.0
- Pulsesecure pulse_connect_secure 8.1r3.1
- Pulsesecure pulse_policy_secure 5.3r1.0
- Pulsesecure pulse_policy_secure 5.1r4.0
- Pulsesecure pulse_policy_secure 9.0r3
- Pulsesecure pulse_policy_secure 5.1r12.1
- Pulsesecure pulse_policy_secure 9.0r1
- Pulsesecure pulse_connect_secure 8.1r12.1
- Pulsesecure pulse_policy_secure 5.3rx
- Pulsesecure pulse_connect_secure 8.1r14.0
- Pulsesecure pulse_policy_secure 5.4r2
- Pulsesecure pulse_connect_secure 8.2r5.1
- Pulsesecure pulse_connect_secure 8.1r11.1
- Pulsesecure pulse_policy_secure 5.3r10.
- Pulsesecure pulse_policy_secure 5.4rx
- Pulsesecure pulse_policy_secure 5.1r9.1
- Pulsesecure pulse_policy_secure 5.1r3.0
- Pulsesecure pulse_policy_secure 5.1r8.0
- Pulsesecure pulse_connect_secure 8.3r3
- Pulsesecure pulse_connect_secure 8.2r7.2
- Pulsesecure pulse_policy_secure 5.1r3.2
- Pulsesecure pulse_policy_secure 5.2r11.0
- Pulsesecure pulse_connect_secure 8.3r2.1
- Pulsesecure pulse_connect_secure 8.1r2.1
- Pulsesecure pulse_connect_secure 8.3r1
- Pulsesecure pulse_connect_secure 8.2r7.0
- Pulsesecure pulse_policy_secure 5.3r12.0
- Pulsesecure pulse_policy_secure 5.4r5.2
- Pulsesecure pulse_policy_secure 9.0r3.1
- Pulsesecure pulse_connect_secure 8.2rx
- Pulsesecure pulse_policy_secure 5.1r13.0
- Pulsesecure pulse_connect_secure 8.3r5
- Pulsesecure pulse_policy_secure 5.3r4.0
- Pulsesecure pulse_policy_secure 5.4r6.1
- Pulsesecure pulse_connect_secure 8.2r8.0
- Pulsesecure pulse_connect_secure 8.3r7
- Pulsesecure pulse_connect_secure 8.1r6.0
- Pulsesecure pulse_connect_secure 8.2r8.2
- Pulsesecure pulse_connect_secure 8.1r1.0
- Pulsesecure pulse_policy_secure 9.0rx
- Pulsesecure pulse_connect_secure 9.0r3.1
- Pulsesecure pulse_connect_secure 8.1r7.0
- Pulsesecure pulse_connect_secure 8.2r3.1
- Pulsesecure pulse_connect_secure 8.1r10.0
- Pulsesecure pulse_policy_secure 5.1r6.0
- Pulsesecure pulse_policy_secure 5.2r1.0
- Pulsesecure pulse_policy_secure 5.4r5
- Pulsesecure pulse_connect_secure 8.1r4.1
- Pulsesecure pulse_policy_secure 5.4r3
- Pulsesecure pulse_connect_secure 8.1r8.0
- Pulsesecure pulse_connect_secure 8.3r5.1
- Pulsesecure pulse_connect_secure 8.2r10.0
- Pulsesecure pulse_policy_secure 5.4r1
- Pulsesecure pulse_connect_secure 8.2r4.0
Severity: HIGH
Description:
This signature detects Web pages with Web folders pointing to a client-side folder using the shell URI scheme. Attackers can use a malicious Web page containing a client-side Web folder to install arbitrary files in sensitive locations on the client filesystem, such as the startup folder. However, a specially crafted Web site could be using a client-side Web folder legitimately.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Microsoft windows_xp_professional
- Microsoft windows_xp_home
- Microsoft windows_98se
- Microsoft windows_2000_professional SP3
- Microsoft windows_2000_server SP3
- Microsoft windows_2000_advanced_server SP3
- Microsoft internet_explorer 6.0
- Microsoft windows_2000_datacenter_server SP3
- Microsoft windows_xp_64-bit_edition SP1
- Microsoft internet_explorer 5.0.1
- Microsoft windows_2000_datacenter_server SP1
- Microsoft windows_2000_datacenter_server
- Microsoft windows_xp_tablet_pc_edition SP2
- Microsoft windows_2000_professional
- Microsoft .net_framework 1.1
- Nortel_networks mobile_voice_client_2050
- Microsoft windows_2000_server
- Microsoft windows_2000_professional SP1
- Microsoft windows_2000_advanced_server SP1
- Microsoft internet_explorer 5.5 SP1
- Nortel_networks optivity_telephony_manager_(otm)
- Microsoft internet_explorer 5.0.1 SP4
- Microsoft windows_2000_datacenter_server SP4
- Microsoft windows_2000_professional SP4
- Microsoft windows_2000_server SP4
- Microsoft windows_xp_media_center_edition SP1
- Microsoft internet_explorer 6.0 SP1
- Microsoft windows_xp_64-bit_edition_version_2003
- Microsoft windows_xp_media_center_edition
- Microsoft windows_xp_tablet_pc_edition
- Microsoft windows_2000_server SP1
- Microsoft internet_explorer 5.0.1 SP2
- Microsoft windows_2000_advanced_server
- Microsoft windows_me
- Microsoft windows_xp_64-bit_edition
- Microsoft windows_xp_media_center_edition SP2
- Nortel_networks symposium_web_client
- Microsoft windows_xp_home SP1
- Microsoft windows_xp_professional SP1
- Nortel_networks ip_softphone_2050
- Microsoft windows_server_2003_standard_edition
- Microsoft windows_2000_advanced_server SP4
- Microsoft internet_explorer 5.5 SP2
- Microsoft windows_2000_advanced_server SP2
- Microsoft windows_2000_datacenter_server SP2
- Microsoft windows_2000_professional SP2
- Microsoft windows_2000_server SP2
- Nortel_networks symposium_web_center_portal_(swcp)
- Microsoft windows_98
- Microsoft windows_server_2003_enterprise_edition
- Microsoft windows_server_2003_datacenter_edition
- Microsoft windows_server_2003_web_edition
- Microsoft windows_server_2003_enterprise_edition_itanium
- Microsoft windows_server_2003_datacenter_edition_itanium
- Microsoft internet_explorer 5.0.1 SP3
- Microsoft internet_explorer 5.5
- Microsoft windows_xp_home SP2
- Microsoft windows_xp_professional SP2
- Microsoft windows_xp_tablet_pc_edition SP1
- Microsoft internet_explorer 5.0.1 SP1
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Zoho ManageEngine Applications Manager. A successful attack can lead to SQL injection and arbitrary code execution.
Supported On:
idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, isg-3.5.141818, vsrx-17.4, srx-branch-17.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, vsrx3bsd-18.2, isg-3.5.0, srx-19.1, vsrx3bsd-19.1, vsrx-19.1, j-series-9.5, vsrx-19.2, srx-19.2, srx-branch-19.2, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, srx-branch-19.1, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, vsrx3bsd-19.2, idp-5.0.0, srx-18.2, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, srx-17.4, idp-5.1.110170603, vsrx-15.1
References:
Affected Products:
- Zohocorp manageengine_opmanager 12.3
- Zohocorp manageengine_opmanager 12.2
- Zohocorp manageengine_opmanager 11.4
- Zohocorp manageengine_opmanager -
- Zohocorp manageengine_opmanager 11.5
- Zohocorp manageengine_opmanager 12.4